<?xml version="1.0" encoding="UTF-8"?>
	<oval_definitions
		xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd"
		xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5"
		xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
		xmlns:oval="http://oval.mitre.org/XMLSchema/oval-common-5"
		xmlns:oval-def="http://oval.mitre.org/XMLSchema/oval-definitions-5">
	  <generator>
	      <oval:product_name>Marcus Updateinfo to OVAL Converter</oval:product_name>
	      <oval:schema_version>5.5</oval:schema_version>
	      <oval:timestamp>2023-09-28T05:20:12</oval:timestamp>
	  </generator>
<definitions>
<definition id="oval:org.opensuse.security:def:201520107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-20107</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-20107" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-20107" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-20107" ref_url="https://www.suse.com/security/cve/CVE-2015-20107" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011348.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2357-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/26DEFHSQZHFG2QZLJD7AX3TDPAXVFWZR/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014044.html" source="SUSE-SU"/>
    <description>
    In Python (aka CPython) up to 3.10.8, the mailcap module does not add escape characters into commands discovered in the system mailcap file. This may allow attackers to inject shell commands into applications that call mailcap.findmatch with untrusted input (if they lack validation of user-provided filenames or arguments). The fix is also back-ported to 3.7, 3.8, 3.9
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2023-03-18"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2015-20107/">CVE-2015-20107</cve>
	<bugzilla href="https://bugzilla.suse.com/1198511">SUSE bug 1198511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200507">SUSE bug 1200507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201777">SUSE bug 1201777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201791">SUSE bug 1201791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205068">SUSE bug 1205068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208337">SUSE bug 1208337</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705474" comment="libpython3_6m1_0-3.6.15-150300.10.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705475" comment="python3-3.6.15-150300.10.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705476" comment="python3-base-3.6.15-150300.10.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3695</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3695" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3695" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3695" ref_url="https://www.suse.com/security/cve/CVE-2016-3695" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    The einj_error_inject function in drivers/acpi/apei/einj.c in the Linux kernel allows local users to simulate hardware errors and consequently cause a denial of service by leveraging failure to disable APEI error injection through EINJ when securelevel is set.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-15"/>
	<updated date="2022-12-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-3695/">CVE-2016-3695</cve>
	<bugzilla href="https://bugzilla.suse.com/1023051">SUSE bug 1023051</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009711223" comment="kernel-default-5.3.18-150300.59.93.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009711224" comment="kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721582" comment="kernel-rt-5.3.18-150300.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3709</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3709" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3709" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3709" ref_url="https://www.suse.com/security/cve/CVE-2016-3709" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2833-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/025986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2834-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/025987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2836-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/025989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2838-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/025990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2839-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/025991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2840-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/025992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016187.html" source="SUSE-SU"/>
    <description>
    Possible cross-site scripting vulnerability in libxml after commit 960f0e2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-05"/>
	<updated date="2023-09-26"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-3709/">CVE-2016-3709</cve>
	<bugzilla href="https://bugzilla.suse.com/1201978">SUSE bug 1201978</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009718902" comment="libxml2-2-2.9.7-150000.3.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151137" comment="libxml2-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009718905" comment="libxml2-tools-2.9.7-150000.3.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151140" comment="libxml2-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009718907" comment="python3-libxml2-python-2.9.7-150000.3.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177126" comment="python3-libxml2-python is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5753</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5753" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0012-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0031-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0069-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0114-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0115-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0171-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0438-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0472-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0552-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0601-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0609-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0638-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1699-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1800-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1801-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1802-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1803-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1811-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1848-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1892-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1992-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2232-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2506-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015468.html" source="SUSE-SU"/>
		<reference ref_id="TID000019122" ref_url="https://www.suse.com/support/kb/doc/?id=000019122" source="SUSE-SU"/>
		<reference ref_id="TID000019229" ref_url="https://www.suse.com/support/kb/doc/?id=000019229" source="SUSE-SU"/>
		<reference ref_id="TID7022512" ref_url="https://www.suse.com/support/kb/doc/?id=7022512" source="SUSE-SU"/>
		<reference ref_id="TID7022514" ref_url="https://www.suse.com/support/kb/doc/?id=7022514" source="SUSE-SU"/>
		<reference ref_id="TID7022531" ref_url="https://www.suse.com/support/kb/doc/?id=7022531" source="SUSE-SU"/>
		<reference ref_id="TID7022541" ref_url="https://www.suse.com/support/kb/doc/?id=7022541" source="SUSE-SU"/>
		<reference ref_id="TID7022548" ref_url="https://www.suse.com/support/kb/doc/?id=7022548" source="SUSE-SU"/>
		<reference ref_id="TID7022568" ref_url="https://www.suse.com/support/kb/doc/?id=7022568" source="SUSE-SU"/>
		<reference ref_id="TID7022569" ref_url="https://www.suse.com/support/kb/doc/?id=7022569" source="SUSE-SU"/>
		<reference ref_id="TID7022571" ref_url="https://www.suse.com/support/kb/doc/?id=7022571" source="SUSE-SU"/>
		<reference ref_id="TID7022572" ref_url="https://www.suse.com/support/kb/doc/?id=7022572" source="SUSE-SU"/>
		<reference ref_id="TID7022578" ref_url="https://www.suse.com/support/kb/doc/?id=7022578" source="SUSE-SU"/>
		<reference ref_id="TID7022579" ref_url="https://www.suse.com/support/kb/doc/?id=7022579" source="SUSE-SU"/>
		<reference ref_id="TID7023075" ref_url="https://www.suse.com/support/kb/doc/?id=7023075" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0023-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1623-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1212-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5IDOTKMILRKOFD2ODQXJF3OOEYZ3EMR5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2861-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5MOJKTUHVZFZADZQ6EYELCLEJ5BD766Q/" source="SUSE-SU"/>
    <description>
    Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-04-12"/>
	<updated date="2023-09-15"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753</cve>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074562">SUSE bug 1074562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074578">SUSE bug 1074578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074701">SUSE bug 1074701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075006">SUSE bug 1075006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075419">SUSE bug 1075419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075748">SUSE bug 1075748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080039">SUSE bug 1080039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087084">SUSE bug 1087084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087939">SUSE bug 1087939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089055">SUSE bug 1089055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136865">SUSE bug 1136865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201877">SUSE bug 1201877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209547">SUSE bug 1209547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009753636" comment="kernel-default-5.3.18-150300.59.118.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009753637" comment="kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009753815" comment="kernel-rt-5.3.18-150300.124.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6512</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6512" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6512" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6512" ref_url="https://www.suse.com/security/cve/CVE-2017-6512" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2666-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012233.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3101-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    Race condition in the rmtree and remove_tree functions in the File-Path module before 2.13 for Perl allows attackers to set the mode on arbitrary files via vectors involving directory-permission loosening logic.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-15"/>
	<updated date="2023-04-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-6512/">CVE-2017-6512</cve>
	<bugzilla href="https://bugzilla.suse.com/1042218">SUSE bug 1042218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047178">SUSE bug 1047178</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009710425" comment="perl-5.26.1-150300.17.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151455" comment="perl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009710426" comment="perl-base-5.26.1-150300.17.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151457" comment="perl-base is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7607</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7607" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7607" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7607" ref_url="https://www.suse.com/security/cve/CVE-2017-7607" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html" source="SUSE-SU"/>
    <description>
    The handle_gnu_hash function in readelf.c in elfutils 0.168 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2023-04-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7607/">CVE-2017-7607</cve>
	<bugzilla href="https://bugzilla.suse.com/1033084">SUSE bug 1033084</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705489" comment="dwarves-1.22-150300.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009703508" comment="dwarves is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705490" comment="elfutils-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152057" comment="elfutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705491" comment="libasm1-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152058" comment="libasm1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705492" comment="libdw1-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152059" comment="libdw1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705493" comment="libdwarves-devel-1.22-150300.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009703509" comment="libdwarves-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705494" comment="libdwarves1-1.22-150300.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009703511" comment="libdwarves1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705495" comment="libebl-plugins-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177196" comment="libebl-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705496" comment="libelf1-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152060" comment="libelf1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177608" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7608</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7608" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7608" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7608" ref_url="https://www.suse.com/security/cve/CVE-2017-7608" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html" source="SUSE-SU"/>
    <description>
    The ebl_object_note_type_name function in eblobjnotetypename.c in elfutils 0.168 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2023-04-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7608/">CVE-2017-7608</cve>
	<bugzilla href="https://bugzilla.suse.com/1033085">SUSE bug 1033085</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705489" comment="dwarves-1.22-150300.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009703508" comment="dwarves is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705490" comment="elfutils-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152057" comment="elfutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705491" comment="libasm1-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152058" comment="libasm1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705492" comment="libdw1-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152059" comment="libdw1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705493" comment="libdwarves-devel-1.22-150300.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009703509" comment="libdwarves-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705494" comment="libdwarves1-1.22-150300.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009703511" comment="libdwarves1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705495" comment="libebl-plugins-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177196" comment="libebl-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705496" comment="libelf1-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152060" comment="libelf1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7609</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7609" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7609" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7609" ref_url="https://www.suse.com/security/cve/CVE-2017-7609" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html" source="SUSE-SU"/>
    <description>
    elf_compress.c in elfutils 0.168 does not validate the zlib compression factor, which allows remote attackers to cause a denial of service (memory consumption) via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2023-04-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7609/">CVE-2017-7609</cve>
	<bugzilla href="https://bugzilla.suse.com/1033086">SUSE bug 1033086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705489" comment="dwarves-1.22-150300.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009703508" comment="dwarves is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705490" comment="elfutils-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152057" comment="elfutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705491" comment="libasm1-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152058" comment="libasm1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705492" comment="libdw1-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152059" comment="libdw1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705493" comment="libdwarves-devel-1.22-150300.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009703509" comment="libdwarves-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705494" comment="libdwarves1-1.22-150300.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009703511" comment="libdwarves1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705495" comment="libebl-plugins-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177196" comment="libebl-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705496" comment="libelf1-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152060" comment="libelf1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7610</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7610" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7610" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7610" ref_url="https://www.suse.com/security/cve/CVE-2017-7610" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html" source="SUSE-SU"/>
    <description>
    The check_group function in elflint.c in elfutils 0.168 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2023-04-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7610/">CVE-2017-7610</cve>
	<bugzilla href="https://bugzilla.suse.com/1033087">SUSE bug 1033087</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705489" comment="dwarves-1.22-150300.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009703508" comment="dwarves is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705490" comment="elfutils-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152057" comment="elfutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705491" comment="libasm1-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152058" comment="libasm1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705492" comment="libdw1-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152059" comment="libdw1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705493" comment="libdwarves-devel-1.22-150300.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009703509" comment="libdwarves-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705494" comment="libdwarves1-1.22-150300.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009703511" comment="libdwarves1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705495" comment="libebl-plugins-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177196" comment="libebl-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705496" comment="libelf1-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152060" comment="libelf1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7611</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7611" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7611" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7611" ref_url="https://www.suse.com/security/cve/CVE-2017-7611" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html" source="SUSE-SU"/>
    <description>
    The check_symtab_shndx function in elflint.c in elfutils 0.168 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2023-04-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7611/">CVE-2017-7611</cve>
	<bugzilla href="https://bugzilla.suse.com/1033088">SUSE bug 1033088</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705489" comment="dwarves-1.22-150300.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009703508" comment="dwarves is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705490" comment="elfutils-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152057" comment="elfutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705491" comment="libasm1-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152058" comment="libasm1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705492" comment="libdw1-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152059" comment="libdw1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705493" comment="libdwarves-devel-1.22-150300.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009703509" comment="libdwarves-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705494" comment="libdwarves1-1.22-150300.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009703511" comment="libdwarves1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705495" comment="libebl-plugins-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177196" comment="libebl-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705496" comment="libelf1-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152060" comment="libelf1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177612" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7612</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7612" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7612" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7612" ref_url="https://www.suse.com/security/cve/CVE-2017-7612" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html" source="SUSE-SU"/>
    <description>
    The check_sysv_hash function in elflint.c in elfutils 0.168 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2023-04-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7612/">CVE-2017-7612</cve>
	<bugzilla href="https://bugzilla.suse.com/1033089">SUSE bug 1033089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705489" comment="dwarves-1.22-150300.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009703508" comment="dwarves is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705490" comment="elfutils-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152057" comment="elfutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705491" comment="libasm1-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152058" comment="libasm1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705492" comment="libdw1-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152059" comment="libdw1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705493" comment="libdwarves-devel-1.22-150300.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009703509" comment="libdwarves-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705494" comment="libdwarves1-1.22-150300.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009703511" comment="libdwarves1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705495" comment="libebl-plugins-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177196" comment="libebl-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705496" comment="libelf1-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152060" comment="libelf1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7613</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7613" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7613" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7613" ref_url="https://www.suse.com/security/cve/CVE-2017-7613" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html" source="SUSE-SU"/>
    <description>
    elflint.c in elfutils 0.168 does not validate the number of sections and the number of segments, which allows remote attackers to cause a denial of service (memory consumption) via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2023-04-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7613/">CVE-2017-7613</cve>
	<bugzilla href="https://bugzilla.suse.com/1033090">SUSE bug 1033090</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705489" comment="dwarves-1.22-150300.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009703508" comment="dwarves is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705490" comment="elfutils-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152057" comment="elfutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705491" comment="libasm1-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152058" comment="libasm1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705492" comment="libdw1-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152059" comment="libdw1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705493" comment="libdwarves-devel-1.22-150300.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009703509" comment="libdwarves-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705494" comment="libdwarves1-1.22-150300.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009703511" comment="libdwarves1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705495" comment="libebl-plugins-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177196" comment="libebl-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705496" comment="libelf1-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152060" comment="libelf1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10903</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10903" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10903" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10903" ref_url="https://www.suse.com/security/cve/CVE-2018-10903" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006644.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012962.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3445-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00065.html" source="SUSE-SU"/>
    <description>
    A flaw was found in python-cryptography versions between &gt;=1.9.0 and &lt;2.3. The finalize_with_tag API did not enforce a minimum tag length. If a user did not validate the input length prior to passing it to finalize_with_tag an attacker could craft an invalid payload with a shortened tag (e.g. 1 byte) such that they would have a 1 in 256 chance of passing the MAC check. GCM tag forgeries can cause key leakage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-18"/>
	<updated date="2023-03-02"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10903/">CVE-2018-10903</cve>
	<bugzilla href="https://bugzilla.suse.com/1101820">SUSE bug 1101820</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009719785" comment="python3-cryptography-2.9.2-150200.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238251" comment="python3-cryptography is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16062</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16062" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16062" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16062" ref_url="https://www.suse.com/security/cve/CVE-2018-16062" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html" source="SUSE-SU"/>
    <description>
    dwarf_getaranges in dwarf_getaranges.c in libdw in elfutils before 2018-08-18 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2023-04-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16062/">CVE-2018-16062</cve>
	<bugzilla href="https://bugzilla.suse.com/1106390">SUSE bug 1106390</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705489" comment="dwarves-1.22-150300.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009703508" comment="dwarves is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705490" comment="elfutils-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152057" comment="elfutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705491" comment="libasm1-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152058" comment="libasm1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705492" comment="libdw1-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152059" comment="libdw1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705493" comment="libdwarves-devel-1.22-150300.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009703509" comment="libdwarves-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705494" comment="libdwarves1-1.22-150300.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009703511" comment="libdwarves1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705495" comment="libebl-plugins-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177196" comment="libebl-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705496" comment="libelf1-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152060" comment="libelf1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16402</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16402" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16402" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16402" ref_url="https://www.suse.com/security/cve/CVE-2018-16402" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html" source="SUSE-SU"/>
    <description>
    libelf/elf_end.c in elfutils 0.173 allows remote attackers to cause a denial of service (double free and application crash) or possibly have unspecified other impact because it tries to decompress twice.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2023-04-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16402/">CVE-2018-16402</cve>
	<bugzilla href="https://bugzilla.suse.com/1107066">SUSE bug 1107066</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705489" comment="dwarves-1.22-150300.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009703508" comment="dwarves is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705490" comment="elfutils-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152057" comment="elfutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705491" comment="libasm1-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152058" comment="libasm1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705492" comment="libdw1-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152059" comment="libdw1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705493" comment="libdwarves-devel-1.22-150300.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009703509" comment="libdwarves-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705494" comment="libdwarves1-1.22-150300.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009703511" comment="libdwarves1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705495" comment="libebl-plugins-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177196" comment="libebl-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705496" comment="libelf1-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152060" comment="libelf1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816403" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16403</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16403" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16403" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16403" ref_url="https://www.suse.com/security/cve/CVE-2018-16403" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html" source="SUSE-SU"/>
    <description>
    libdw in elfutils 0.173 checks the end of the attributes list incorrectly in dwarf_getabbrev in dwarf_getabbrev.c and dwarf_hasattr in dwarf_hasattr.c, leading to a heap-based buffer over-read and an application crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2023-04-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16403/">CVE-2018-16403</cve>
	<bugzilla href="https://bugzilla.suse.com/1107067">SUSE bug 1107067</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705489" comment="dwarves-1.22-150300.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009703508" comment="dwarves is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705490" comment="elfutils-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152057" comment="elfutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705491" comment="libasm1-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152058" comment="libasm1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705492" comment="libdw1-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152059" comment="libdw1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705493" comment="libdwarves-devel-1.22-150300.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009703509" comment="libdwarves-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705494" comment="libdwarves1-1.22-150300.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009703511" comment="libdwarves1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705495" comment="libebl-plugins-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177196" comment="libebl-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705496" comment="libelf1-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152060" comment="libelf1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818310" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18310</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18310" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18310" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18310" ref_url="https://www.suse.com/security/cve/CVE-2018-18310" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html" source="SUSE-SU"/>
    <description>
    An invalid memory address dereference was discovered in dwfl_segment_report_module.c in libdwfl in elfutils through v0.174. The vulnerability allows attackers to cause a denial of service (application crash) with a crafted ELF file, as demonstrated by consider_notes.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2023-04-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18310/">CVE-2018-18310</cve>
	<bugzilla href="https://bugzilla.suse.com/1111973">SUSE bug 1111973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705489" comment="dwarves-1.22-150300.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009703508" comment="dwarves is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705490" comment="elfutils-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152057" comment="elfutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705491" comment="libasm1-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152058" comment="libasm1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705492" comment="libdw1-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152059" comment="libdw1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705493" comment="libdwarves-devel-1.22-150300.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009703509" comment="libdwarves-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705494" comment="libdwarves1-1.22-150300.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009703511" comment="libdwarves1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705495" comment="libebl-plugins-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177196" comment="libebl-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705496" comment="libelf1-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152060" comment="libelf1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18520</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18520" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18520" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18520" ref_url="https://www.suse.com/security/cve/CVE-2018-18520" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html" source="SUSE-SU"/>
    <description>
    An Invalid Memory Address Dereference exists in the function elf_end in libelf in elfutils through v0.174. Although eu-size is intended to support ar files inside ar files, handle_ar in size.c closes the outer ar file before handling all inner entries. The vulnerability allows attackers to cause a denial of service (application crash) with a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2023-04-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18520/">CVE-2018-18520</cve>
	<bugzilla href="https://bugzilla.suse.com/1112726">SUSE bug 1112726</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705489" comment="dwarves-1.22-150300.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009703508" comment="dwarves is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705490" comment="elfutils-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152057" comment="elfutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705491" comment="libasm1-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152058" comment="libasm1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705492" comment="libdw1-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152059" comment="libdw1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705493" comment="libdwarves-devel-1.22-150300.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009703509" comment="libdwarves-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705494" comment="libdwarves1-1.22-150300.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009703511" comment="libdwarves1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705495" comment="libebl-plugins-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177196" comment="libebl-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705496" comment="libelf1-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152060" comment="libelf1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18521</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18521" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18521" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18521" ref_url="https://www.suse.com/security/cve/CVE-2018-18521" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html" source="SUSE-SU"/>
    <description>
    Divide-by-zero vulnerabilities in the function arlib_add_symbols() in arlib.c in elfutils 0.174 allow remote attackers to cause a denial of service (application crash) with a crafted ELF file, as demonstrated by eu-ranlib, because a zero sh_entsize is mishandled.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2023-04-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18521/">CVE-2018-18521</cve>
	<bugzilla href="https://bugzilla.suse.com/1112723">SUSE bug 1112723</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705489" comment="dwarves-1.22-150300.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009703508" comment="dwarves is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705490" comment="elfutils-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152057" comment="elfutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705491" comment="libasm1-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152058" comment="libasm1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705492" comment="libdw1-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152059" comment="libdw1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705493" comment="libdwarves-devel-1.22-150300.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009703509" comment="libdwarves-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705494" comment="libdwarves1-1.22-150300.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009703511" comment="libdwarves1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705495" comment="libebl-plugins-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177196" comment="libebl-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705496" comment="libelf1-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152060" comment="libelf1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11098</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11098" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11098" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11098" ref_url="https://www.suse.com/security/cve/CVE-2019-11098" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013429.html" source="SUSE-SU"/>
    <description>
    Insufficient input validation in MdeModulePkg in EDKII may allow an unauthenticated user to potentially enable escalation of privilege, denial of service and/or information disclosure via physical access.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-01-07"/>
	<updated date="2023-01-07"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11098/">CVE-2019-11098</cve>
	<bugzilla href="https://bugzilla.suse.com/1188371">SUSE bug 1188371</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009730086" comment="qemu-ovmf-x86_64-202008-150300.10.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231460" comment="qemu-ovmf-x86_64 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009730087" comment="qemu-uefi-aarch64-202008-150300.10.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623392" comment="qemu-uefi-aarch64 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913224" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13224</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13224" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13224" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13224" ref_url="https://www.suse.com/security/cve/CVE-2019-13224" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012320.html" source="SUSE-SU"/>
    <description>
    A use-after-free in onig_new_deluxe() in regext.c in Oniguruma 6.9.2 allows attackers to potentially cause information disclosure, denial of service, or possibly code execution by providing a crafted regular expression. The attacker provides a pair of a regex pattern and a string, with a multi-byte encoding that gets handled by onig_new_deluxe(). Oniguruma issues often affect Ruby, as well as common optional libraries for PHP and Rust.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-24"/>
	<updated date="2022-10-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-13224/">CVE-2019-13224</cve>
	<bugzilla href="https://bugzilla.suse.com/1142847">SUSE bug 1142847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203568">SUSE bug 1203568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009708039" comment="libonig4-6.7.0-150000.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009714765" comment="libonig4 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14560</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14560" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14560" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14560" ref_url="https://www.suse.com/security/cve/CVE-2019-14560" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:1921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1941-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1958-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1968-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2234-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029445.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-04-25"/>
	<updated date="2023-05-18"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-14560/">CVE-2019-14560</cve>
	<bugzilla href="https://bugzilla.suse.com/1174246">SUSE bug 1174246</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009754737" comment="qemu-ovmf-x86_64-202008-150300.10.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231460" comment="qemu-ovmf-x86_64 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009754738" comment="qemu-uefi-aarch64-202008-150300.10.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623392" comment="qemu-uefi-aarch64 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16163</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16163" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16163" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16163" ref_url="https://www.suse.com/security/cve/CVE-2019-16163" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012320.html" source="SUSE-SU"/>
    <description>
    Oniguruma before 6.9.3 allows Stack Exhaustion in regcomp.c because of recursion in regparse.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-24"/>
	<updated date="2022-10-23"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16163/">CVE-2019-16163</cve>
	<bugzilla href="https://bugzilla.suse.com/1150130">SUSE bug 1150130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203568">SUSE bug 1203568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009708039" comment="libonig4-6.7.0-150000.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009714765" comment="libonig4 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918348" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18348</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18348" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18348" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18348" ref_url="https://www.suse.com/security/cve/CVE-2019-18348" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013149.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2332-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S3JTHM6LLDKL7VPNRJUSRPNZAD2FZ25H/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2333-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLGERALYYFTBIX3ZKPM6EQ2WJVUXLOXY/" source="SUSE-SU"/>
    <description>
    An issue was discovered in urllib2 in Python 2.x through 2.7.17 and urllib in Python 3.x through 3.8.0. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the host component of a URL) followed by an HTTP header. This is similar to the CVE-2019-9740 query string issue and the CVE-2019-9947 path string issue. (This is not exploitable when glibc has CVE-2016-10739 fixed.). This is fixed in: v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1; v3.6.11, v3.6.11rc1, v3.6.12; v3.7.8, v3.7.8rc1, v3.7.9; v3.8.3, v3.8.3rc1, v3.8.4, v3.8.4rc1, v3.8.5, v3.8.6, v3.8.6rc1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-30"/>
	<updated date="2023-03-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18348/">CVE-2019-18348</cve>
	<bugzilla href="https://bugzilla.suse.com/1155094">SUSE bug 1155094</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009726610" comment="libpython3_6m1_0-3.6.15-150300.10.37.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009726611" comment="python3-3.6.15-150300.10.37.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009726612" comment="python3-base-3.6.15-150300.10.37.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19083</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19083" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19083" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19083" ref_url="https://www.suse.com/security/cve/CVE-2019-19083" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013530.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    Memory leaks in *clock_source_create() functions under drivers/gpu/drm/amd/display/dc in the Linux kernel before 5.3.8 allow attackers to cause a denial of service (memory consumption). This affects the dce112_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce112/dce112_resource.c, the dce100_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce100/dce100_resource.c, the dcn10_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dcn10/dcn10_resource.c, the dcn20_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dcn20/dcn20_resource.c, the dce120_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce120/dce120_resource.c, the dce110_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce110/dce110_resource.c, and the dce80_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce80/dce80_resource.c, aka CID-055e547478a1.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-01-26"/>
	<updated date="2023-03-18"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19083/">CVE-2019-19083</cve>
	<bugzilla href="https://bugzilla.suse.com/1157049">SUSE bug 1157049</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009735606" comment="kernel-default-5.3.18-150300.59.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009735607" comment="kernel-default-base-5.3.18-150300.59.109.1.150300.18.62.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009734769" comment="kernel-rt-5.3.18-150300.115.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19203</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19203" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19203" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19203" ref_url="https://www.suse.com/security/cve/CVE-2019-19203" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012320.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Oniguruma 6.x before 6.9.4_rc2. In the function gb18030_mbc_enc_len in file gb18030.c, a UChar pointer is dereferenced without checking if it passed the end of the matched string. This leads to a heap-based buffer over-read.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-24"/>
	<updated date="2022-10-23"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19203/">CVE-2019-19203</cve>
	<bugzilla href="https://bugzilla.suse.com/1164550">SUSE bug 1164550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203568">SUSE bug 1203568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009708039" comment="libonig4-6.7.0-150000.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009714765" comment="libonig4 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19204</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19204" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19204" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19204" ref_url="https://www.suse.com/security/cve/CVE-2019-19204" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012320.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Oniguruma 6.x before 6.9.4_rc2. In the function fetch_interval_quantifier (formerly known as fetch_range_quantifier) in regparse.c, PFETCH is called without checking PEND. This leads to a heap-based buffer over-read.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-24"/>
	<updated date="2022-10-23"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19204/">CVE-2019-19204</cve>
	<bugzilla href="https://bugzilla.suse.com/1164569">SUSE bug 1164569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203568">SUSE bug 1203568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009708039" comment="libonig4-6.7.0-150000.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009714765" comment="libonig4 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919246" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19246</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19246" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19246" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19246" ref_url="https://www.suse.com/security/cve/CVE-2019-19246" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012320.html" source="SUSE-SU"/>
    <description>
    Oniguruma through 6.9.3, as used in PHP 7.3.x and other products, has a heap-based buffer over-read in str_lower_case_match in regexec.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-24"/>
	<updated date="2022-10-23"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19246/">CVE-2019-19246</cve>
	<bugzilla href="https://bugzilla.suse.com/1157805">SUSE bug 1157805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203568">SUSE bug 1203568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009708039" comment="libonig4-6.7.0-150000.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009714765" comment="libonig4 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19377</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19377" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19377" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19377" ref_url="https://www.suse.com/security/cve/CVE-2019-19377" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011744.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S2QMD6CJ6PZDFYQ3RKSOGAZNRK7WC5W7/" source="SUSE-SU"/>
    <description>
    In the Linux kernel 5.0.21, mounting a crafted btrfs filesystem image, performing some operations, and unmounting can lead to a use-after-free in btrfs_queue_work in fs/btrfs/async-thread.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2023-05-19"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19377/">CVE-2019-19377</cve>
	<bugzilla href="https://bugzilla.suse.com/1158266">SUSE bug 1158266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162338">SUSE bug 1162338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162369">SUSE bug 1162369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173871">SUSE bug 1173871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211495">SUSE bug 1211495</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009684736" comment="kernel-rt-5.3.18-150300.93.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20454</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20454" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20454" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20454" ref_url="https://www.suse.com/security/cve/CVE-2019-20454" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011755.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2649-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZVHVSVNKKW7CC77JRUJ23MMS76WXHBBU/" source="SUSE-SU"/>
    <description>
    An out-of-bounds read was discovered in PCRE before 10.34 when the pattern \X is JIT compiled and used to match specially crafted subjects in non-UTF mode. Applications that use PCRE to parse untrusted input may be vulnerable to this flaw, which would allow an attacker to crash the application. The flaw occurs in do_extuni_no_utf in pcre2_jit_compile.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2022-11-19"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20454/">CVE-2019-20454</cve>
	<bugzilla href="https://bugzilla.suse.com/1164384">SUSE bug 1164384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172973">SUSE bug 1172973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009701289" comment="libpcre2-8-0-10.31-150000.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153653" comment="libpcre2-8-0 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192708" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2708</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2708" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2708" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2708" ref_url="https://www.suse.com/security/cve/CVE-2019-2708" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:3135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013108.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013158.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Data Store component of Oracle Berkeley DB. Supported versions that are affected are Prior to 6.138, prior to 6.2.38 and prior to 18.1.32. Easily exploitable vulnerability allows low privileged attacker having Local Logon privilege with logon to the infrastructure where Data Store executes to compromise Data Store. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Data Store. CVSS 3.0 Base Score 3.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-25"/>
	<updated date="2022-11-30"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2708/">CVE-2019-2708</cve>
	<bugzilla href="https://bugzilla.suse.com/1174414">SUSE bug 1174414</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009725639" comment="db48-utils-4.8.30-150000.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009726773" comment="db48-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009725640" comment="libdb-4_8-4.8.30-150000.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009726774" comment="libdb-4_8 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6502</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6502" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6502" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6502" ref_url="https://www.suse.com/security/cve/CVE-2019-6502" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013092.html" source="SUSE-SU"/>
    <description>
    sc_context_create in ctx.c in libopensc in OpenSC 0.19.0 has a memory leak, as demonstrated by a call from eidenv.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-24"/>
	<updated date="2022-11-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-6502/">CVE-2019-6502</cve>
	<bugzilla href="https://bugzilla.suse.com/1122756">SUSE bug 1122756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179291">SUSE bug 1179291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009714771" comment="opensc-0.19.0-150100.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239073" comment="opensc is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7146</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7146" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7146" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7146" ref_url="https://www.suse.com/security/cve/CVE-2019-7146" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012057.html" source="SUSE-SU"/>
    <description>
    In elfutils 0.175, there is a buffer over-read in the ebl_object_note function in eblobjnote.c in libebl. Remote attackers could leverage this vulnerability to cause a denial-of-service via a crafted elf file, as demonstrated by eu-readelf.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2023-09-06"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7146/">CVE-2019-7146</cve>
	<bugzilla href="https://bugzilla.suse.com/1123545">SUSE bug 1123545</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705489" comment="dwarves-1.22-150300.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009703508" comment="dwarves is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705490" comment="elfutils-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152057" comment="elfutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705491" comment="libasm1-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152058" comment="libasm1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705492" comment="libdw1-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152059" comment="libdw1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705493" comment="libdwarves-devel-1.22-150300.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009703509" comment="libdwarves-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705494" comment="libdwarves1-1.22-150300.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009703511" comment="libdwarves1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705495" comment="libebl-plugins-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177196" comment="libebl-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705496" comment="libelf1-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152060" comment="libelf1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7148</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7148" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7148" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7148" ref_url="https://www.suse.com/security/cve/CVE-2019-7148" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012057.html" source="SUSE-SU"/>
    <description>
    An attempted excessive memory allocation was discovered in the function read_long_names in elf_begin.c in libelf in elfutils 0.174. Remote attackers could leverage this vulnerability to cause a denial-of-service via crafted elf input, which leads to an out-of-memory exception. NOTE: The maintainers believe this is not a real issue, but instead a "warning caused by ASAN because the allocation is big. By setting ASAN_OPTIONS=allocator_may_return_null=1 and running the reproducer, nothing happens."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2023-04-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7148/">CVE-2019-7148</cve>
	<bugzilla href="https://bugzilla.suse.com/1123687">SUSE bug 1123687</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705489" comment="dwarves-1.22-150300.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009703508" comment="dwarves is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705490" comment="elfutils-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152057" comment="elfutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705491" comment="libasm1-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152058" comment="libasm1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705492" comment="libdw1-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152059" comment="libdw1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705493" comment="libdwarves-devel-1.22-150300.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009703509" comment="libdwarves-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705494" comment="libdwarves1-1.22-150300.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009703511" comment="libdwarves1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705495" comment="libebl-plugins-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177196" comment="libebl-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705496" comment="libelf1-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152060" comment="libelf1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197149" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7149</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7149" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7149" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7149" ref_url="https://www.suse.com/security/cve/CVE-2019-7149" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012057.html" source="SUSE-SU"/>
    <description>
    A heap-based buffer over-read was discovered in the function read_srclines in dwarf_getsrclines.c in libdw in elfutils 0.175. A crafted input can cause segmentation faults, leading to denial-of-service, as demonstrated by eu-nm.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2023-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7149/">CVE-2019-7149</cve>
	<bugzilla href="https://bugzilla.suse.com/1123559">SUSE bug 1123559</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705489" comment="dwarves-1.22-150300.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009703508" comment="dwarves is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705490" comment="elfutils-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152057" comment="elfutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705491" comment="libasm1-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152058" comment="libasm1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705492" comment="libdw1-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152059" comment="libdw1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705493" comment="libdwarves-devel-1.22-150300.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009703509" comment="libdwarves-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705494" comment="libdwarves1-1.22-150300.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009703511" comment="libdwarves1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705495" comment="libebl-plugins-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177196" comment="libebl-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705496" comment="libelf1-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152060" comment="libelf1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7150</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7150" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7150" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7150" ref_url="https://www.suse.com/security/cve/CVE-2019-7150" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in elfutils 0.175. A segmentation fault can occur in the function elf64_xlatetom in libelf/elf32_xlatetom.c, due to dwfl_segment_report_module not checking whether the dyn data read from a core file is truncated. A crafted input can cause a program crash, leading to denial-of-service, as demonstrated by eu-stack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2023-04-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7150/">CVE-2019-7150</cve>
	<bugzilla href="https://bugzilla.suse.com/1123685">SUSE bug 1123685</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705489" comment="dwarves-1.22-150300.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009703508" comment="dwarves is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705490" comment="elfutils-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152057" comment="elfutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705491" comment="libasm1-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152058" comment="libasm1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705492" comment="libdw1-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152059" comment="libdw1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705493" comment="libdwarves-devel-1.22-150300.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009703509" comment="libdwarves-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705494" comment="libdwarves1-1.22-150300.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009703511" comment="libdwarves1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705495" comment="libebl-plugins-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177196" comment="libebl-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705496" comment="libelf1-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152060" comment="libelf1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7664</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7664" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7664" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7664" ref_url="https://www.suse.com/security/cve/CVE-2019-7664" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012057.html" source="SUSE-SU"/>
    <description>
    In elfutils 0.175, a negative-sized memcpy is attempted in elf_cvt_note in libelf/note_xlate.h because of an incorrect overflow check. Crafted elf input causes a segmentation fault, leading to denial of service (program crash).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2023-04-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7664/">CVE-2019-7664</cve>
	<bugzilla href="https://bugzilla.suse.com/1125008">SUSE bug 1125008</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705489" comment="dwarves-1.22-150300.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009703508" comment="dwarves is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705490" comment="elfutils-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152057" comment="elfutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705491" comment="libasm1-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152058" comment="libasm1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705492" comment="libdw1-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152059" comment="libdw1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705493" comment="libdwarves-devel-1.22-150300.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009703509" comment="libdwarves-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705494" comment="libdwarves1-1.22-150300.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009703511" comment="libdwarves1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705495" comment="libebl-plugins-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177196" comment="libebl-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705496" comment="libelf1-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152060" comment="libelf1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197665" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7665</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7665" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7665" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7665" ref_url="https://www.suse.com/security/cve/CVE-2019-7665" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html" source="SUSE-SU"/>
    <description>
    In elfutils 0.175, a heap-based buffer over-read was discovered in the function elf32_xlatetom in elf32_xlatetom.c in libelf. A crafted ELF input can cause a segmentation fault leading to denial of service (program crash) because ebl_core_note does not reject malformed core file notes.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2023-04-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7665/">CVE-2019-7665</cve>
	<bugzilla href="https://bugzilla.suse.com/1125007">SUSE bug 1125007</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705489" comment="dwarves-1.22-150300.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009703508" comment="dwarves is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705490" comment="elfutils-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152057" comment="elfutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705491" comment="libasm1-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152058" comment="libasm1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705492" comment="libdw1-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152059" comment="libdw1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705493" comment="libdwarves-devel-1.22-150300.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009703509" comment="libdwarves-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705494" comment="libdwarves1-1.22-150300.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009703511" comment="libdwarves1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705495" comment="libebl-plugins-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177196" comment="libebl-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705496" comment="libelf1-0.177-150300.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152060" comment="libelf1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10531</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10531" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10531" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10531" ref_url="https://www.suse.com/security/cve/CVE-2020-10531" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0819-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1568-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016117.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00004.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in International Components for Unicode (ICU) for C/C++ through 66.1. An integer overflow, leading to a heap-based buffer overflow, exists in the UnicodeString::doAppend() function in common/unistr.cpp.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-09-12"/>
	<updated date="2023-09-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10531/">CVE-2020-10531</cve>
	<bugzilla href="https://bugzilla.suse.com/1166844">SUSE bug 1166844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175778">SUSE bug 1175778</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009781385" comment="libicu73_2-73.2-150000.1.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009782296" comment="libicu73_2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009781386" comment="libicu73_2-bedata-73.2-150000.1.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009782297" comment="libicu73_2-bedata is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009781389" comment="libicu73_2-ledata-73.2-150000.1.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009782300" comment="libicu73_2-ledata is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10696</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10696" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10696" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10696" ref_url="https://www.suse.com/security/cve/CVE-2020-10696" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2741-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-October/025850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013201.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2106-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q7YYGMTZ4T4RLHDVCMQD3K6CDIAXO3O3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0310-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P4DQSPUPKAZCPS5MQYTAYGS7YM76UIHZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0770-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WFIDXN6UAK2I4PPVFPBE4STNQH2FZQ4A/" source="SUSE-SU"/>
    <description>
    A path traversal flaw was found in Buildah in versions before 1.14.5. This flaw allows an attacker to trick a user into building a malicious container image hosted on an HTTP(s) server and then write files to the user's system anywhere that the user has permissions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-27"/>
	<updated date="2023-08-31"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10696/">CVE-2020-10696</cve>
	<bugzilla href="https://bugzilla.suse.com/1167864">SUSE bug 1167864</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
</definition>
<definition id="oval:org.opensuse.security:def:202010735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10735</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10735" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10735" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10735" ref_url="https://www.suse.com/security/cve/CVE-2020-10735" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3485-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CCKKVK6RUGD7FMGWHAMOVXOTAX4JRA2I/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013149.html" source="SUSE-SU"/>
    <description>
    A flaw was found in python. In algorithms with quadratic time complexity using non-binary bases, when using int("text"), a system could take 50ms to parse an int string with 100,000 digits and 5s for 1,000,000 digits (float, decimal, int.from_bytes(), and int() for binary bases 2, 4, 8, 16, and 32 are not affected). The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-30"/>
	<updated date="2023-03-02"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10735/">CVE-2020-10735</cve>
	<bugzilla href="https://bugzilla.suse.com/1203125">SUSE bug 1203125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204077">SUSE bug 1204077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204096">SUSE bug 1204096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204097">SUSE bug 1204097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205075">SUSE bug 1205075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208131">SUSE bug 1208131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009726610" comment="libpython3_6m1_0-3.6.15-150300.10.37.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009726611" comment="python3-3.6.15-150300.10.37.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009726612" comment="python3-base-3.6.15-150300.10.37.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014394" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14394</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14394" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14394" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14394" ref_url="https://www.suse.com/security/cve/CVE-2020-14394" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0879-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029043.html" source="SUSE-SU"/>
    <description>
    An infinite loop flaw was found in the USB xHCI controller emulation of QEMU while computing the length of the Transfer Request Block (TRB) Ring. This flaw allows a privileged guest user to hang the QEMU process on the host, resulting in a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-21"/>
	<updated date="2023-04-28"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14394/">CVE-2020-14394</cve>
	<bugzilla href="https://bugzilla.suse.com/1180207">SUSE bug 1180207</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744216" comment="qemu-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744217" comment="qemu-arm-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744220" comment="qemu-audio-spice-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623393" comment="qemu-audio-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744226" comment="qemu-chardev-spice-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623395" comment="qemu-chardev-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744227" comment="qemu-guest-agent-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744228" comment="qemu-hw-display-qxl-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623396" comment="qemu-hw-display-qxl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744488" comment="qemu-hw-display-virtio-gpu-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623397" comment="qemu-hw-display-virtio-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744231" comment="qemu-hw-display-virtio-vga-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623399" comment="qemu-hw-display-virtio-vga is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744232" comment="qemu-hw-usb-redirect-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623401" comment="qemu-hw-usb-redirect is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744233" comment="qemu-ipxe-1.0.0+-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744237" comment="qemu-seabios-1.14.0_0_g155821a-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744238" comment="qemu-sgabios-8-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744239" comment="qemu-tools-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744242" comment="qemu-ui-opengl-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623406" comment="qemu-ui-opengl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744244" comment="qemu-ui-spice-core-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623407" comment="qemu-ui-spice-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744245" comment="qemu-vgabios-1.14.0_0_g155821a-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744246" comment="qemu-x86-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016119" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16119</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16119" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16119" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16119" ref_url="https://www.suse.com/security/cve/CVE-2020-16119" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the Linux kernel exploitable by a local attacker due to reuse of a DCCP socket with an attached dccps_hc_tx_ccid object as a listener after being released. Fixed in Ubuntu Linux kernel 5.4.0-51.56, 5.3.0-68.63, 4.15.0-121.123, 4.4.0-193.224, 3.13.0.182.191 and 3.2.0-149.196.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-27"/>
	<updated date="2023-02-16"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16119/">CVE-2020-16119</cve>
	<bugzilla href="https://bugzilla.suse.com/1177471">SUSE bug 1177471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177742">SUSE bug 1177742</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721862" comment="kernel-default-5.3.18-150300.59.98.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721863" comment="kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721582" comment="kernel-rt-5.3.18-150300.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202021913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-21913</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-21913" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21913" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-21913" ref_url="https://www.suse.com/security/cve/CVE-2020-21913" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:432-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016117.html" source="SUSE-SU"/>
    <description>
    International Components for Unicode (ICU-20850) v66.1 was discovered to contain a use after free bug in the pkg_createWithAssemblyCode function in the file tools/pkgdata/pkgdata.cpp.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-08"/>
	<updated date="2023-09-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21913/">CVE-2020-21913</cve>
	<bugzilla href="https://bugzilla.suse.com/1193951">SUSE bug 1193951</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009707511" comment="libicu-suse65_1-65.1-150200.4.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009710085" comment="libicu-suse65_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009707447" comment="libicu65_1-ledata-65.1-150200.4.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009710088" comment="libicu65_1-ledata is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009781385" comment="libicu73_2-73.2-150000.1.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009782296" comment="libicu73_2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009781386" comment="libicu73_2-bedata-73.2-150000.1.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009782297" comment="libicu73_2-bedata is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009781389" comment="libicu73_2-ledata-73.2-150000.1.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009782300" comment="libicu73_2-ledata is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025657" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25657</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25657" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25657" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25657" ref_url="https://www.suse.com/security/cve/CVE-2020-25657" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2691-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011812.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2562-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NA4Y6CGBLBMV65UJ765OZDE4RW2SLYUP/" source="SUSE-SU"/>
    <description>
    A flaw was found in all released versions of m2crypto, where they are vulnerable to Bleichenbacher timing attacks in the RSA decryption API via the timed processing of valid PKCS#1 v1.5 Ciphertext. The highest threat from this vulnerability is to confidentiality.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2022-09-02"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25657/">CVE-2020-25657</cve>
	<bugzilla href="https://bugzilla.suse.com/1178829">SUSE bug 1178829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009699101" comment="python3-M2Crypto-0.35.2-150000.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009702053" comment="python3-M2Crypto is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25658</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25658" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25658" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25658" ref_url="https://www.suse.com/security/cve/CVE-2020-25658" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013983.html" source="SUSE-SU"/>
    <description>
    It was found that python-rsa is vulnerable to Bleichenbacher timing attacks. An attacker can use this flaw via the RSA decryption API to decrypt parts of the cipher text encrypted with RSA.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-13"/>
	<updated date="2023-03-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25658/">CVE-2020-25658</cve>
	<bugzilla href="https://bugzilla.suse.com/1178676">SUSE bug 1178676</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721522" comment="python3-rsa-3.4.2-150000.3.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479910" comment="python3-rsa is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25659</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25659" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25659" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25659" ref_url="https://www.suse.com/security/cve/CVE-2020-25659" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:99-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2783-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016228.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6HSP2RSDCASVO7P7KBUV5GDZ6SYI6L7I/" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    python-cryptography 3.2 is vulnerable to Bleichenbacher timing attacks in the RSA decryption API, via timed processing of valid PKCS#1 v1.5 ciphertext.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-03"/>
	<updated date="2023-09-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25659/">CVE-2020-25659</cve>
	<bugzilla href="https://bugzilla.suse.com/1178168">SUSE bug 1178168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009739829" comment="python3-cryptography-3.3.2-150200.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238251" comment="python3-cryptography is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26159</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26159" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26159" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26159" ref_url="https://www.suse.com/security/cve/CVE-2020-26159" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012320.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Further investigation showed that it was not a security issue. Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-24"/>
	<updated date="2022-10-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-26159/">CVE-2020-26159</cve>
	<bugzilla href="https://bugzilla.suse.com/1177179">SUSE bug 1177179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203568">SUSE bug 1203568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009708039" comment="libonig4-6.7.0-150000.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009714765" comment="libonig4 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26541</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26541" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26541" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26541" ref_url="https://www.suse.com/security/cve/CVE-2020-26541" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013341.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CWOILJAA3L3ZOAEUSAUQRV4VH2BJEGVX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S2QMD6CJ6PZDFYQ3RKSOGAZNRK7WC5W7/" source="SUSE-SU"/>
    <description>
    The Linux kernel through 5.8.13 does not properly enforce the Secure Boot Forbidden Signature Database (aka dbx) protection mechanism. This affects certs/blacklist.c and certs/system_keyring.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2022-12-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26541/">CVE-2020-26541</cve>
	<bugzilla href="https://bugzilla.suse.com/1177282">SUSE bug 1177282</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705466" comment="kernel-default-5.3.18-150300.59.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705467" comment="kernel-default-base-5.3.18-150300.59.76.1.150300.18.45.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009684736" comment="kernel-rt-5.3.18-150300.93.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027784" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27784</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27784" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27784" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27784" ref_url="https://www.suse.com/security/cve/CVE-2020-27784" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012771.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in the Linux kernel, where accessing a deallocated instance in printer_ioctl() printer_ioctl() tries to access of a printer_dev instance. However, use-after-free arises because it had been freed by gprinter_free().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-15"/>
	<updated date="2022-11-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27784/">CVE-2020-27784</cve>
	<bugzilla href="https://bugzilla.suse.com/1202895">SUSE bug 1202895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009711223" comment="kernel-default-5.3.18-150300.59.93.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009711224" comment="kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721582" comment="kernel-rt-5.3.18-150300.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29129</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29129" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29129" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29129" ref_url="https://www.suse.com/security/cve/CVE-2020-29129" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014131.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0600-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATYM36RK6JXDXZ33F2KFHZHDZ3F3YD24/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1043-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVDDMT7IUGYOEFTYO3UWD73PJMJL4FSY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1942-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IEKBDJBTGKO53MSKM3SRYVUQDWIJ2N5I/" source="SUSE-SU"/>
    <description>
    ncsi.c in libslirp through 4.3.1 has a buffer over-read because it tries to read a certain amount of header data even if that exceeds the total packet length.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-23"/>
	<updated date="2023-03-23"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29129/">CVE-2020-29129</cve>
	<bugzilla href="https://bugzilla.suse.com/1179466">SUSE bug 1179466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179467">SUSE bug 1179467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179477">SUSE bug 1179477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179484">SUSE bug 1179484</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744039" comment="slirp4netns-0.4.7-150100.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266793" comment="slirp4netns is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29130</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29130" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29130" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29130" ref_url="https://www.suse.com/security/cve/CVE-2020-29130" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0943-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010763.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014131.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0600-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATYM36RK6JXDXZ33F2KFHZHDZ3F3YD24/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1043-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVDDMT7IUGYOEFTYO3UWD73PJMJL4FSY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1942-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IEKBDJBTGKO53MSKM3SRYVUQDWIJ2N5I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0943-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JBLIOF4HVH74MTJYI7P5QNH2RNAYWU5E/" source="SUSE-SU"/>
    <description>
    slirp.c in libslirp through 4.3.1 has a buffer over-read because it tries to read a certain amount of header data even if that exceeds the total packet length.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-23"/>
	<updated date="2023-03-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29130/">CVE-2020-29130</cve>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179467">SUSE bug 1179467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179477">SUSE bug 1179477</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744039" comment="slirp4netns-0.4.7-150100.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266793" comment="slirp4netns is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29362</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29362" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29362" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29362" ref_url="https://www.suse.com/security/cve/CVE-2020-29362" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2405-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011972.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in p11-kit 0.21.1 through 0.23.21. A heap-based buffer over-read has been discovered in the RPC protocol used by thep11-kit server/remote commands and the client library. When the remote entity supplies a byte array through a serialized PKCS#11 function call, the receiving entity may allow the reading of up to 4 bytes of memory past the heap allocation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2023-04-29"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29362/">CVE-2020-29362</cve>
	<bugzilla href="https://bugzilla.suse.com/1180065">SUSE bug 1180065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201534">SUSE bug 1201534</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705477" comment="libp11-kit0-0.23.2-150000.4.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009661793" comment="libp11-kit0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705478" comment="p11-kit-0.23.2-150000.4.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009661795" comment="p11-kit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705479" comment="p11-kit-tools-0.23.2-150000.4.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009661800" comment="p11-kit-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35538</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35538" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35538" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35538" ref_url="https://www.suse.com/security/cve/CVE-2020-35538" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012494.html" source="SUSE-SU"/>
    <description>
    A crafted input file could cause a null pointer dereference in jcopy_sample_rows() when processed by libjpeg-turbo.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-05"/>
	<updated date="2022-10-05"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35538/">CVE-2020-35538</cve>
	<bugzilla href="https://bugzilla.suse.com/1202915">SUSE bug 1202915</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009710427" comment="libjpeg8-8.1.2-150000.32.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152543" comment="libjpeg8 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36242</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36242" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36242" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36242" ref_url="https://www.suse.com/security/cve/CVE-2020-36242" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008412.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2783-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016228.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0349-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4QQZIOJTSAUNBJZ24KXLCQWD35GCPXJF/" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    In the cryptography package before 3.3.2 for Python, certain sequences of update calls to symmetrically encrypt multi-GB values could result in an integer overflow and buffer overflow, as demonstrated by the Fernet class.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-03"/>
	<updated date="2023-09-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36242/">CVE-2020-36242</cve>
	<bugzilla href="https://bugzilla.suse.com/1182066">SUSE bug 1182066</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009739829" comment="python3-cryptography-3.3.2-150200.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238251" comment="python3-cryptography is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036516" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36516</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36516" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36516" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36516" ref_url="https://www.suse.com/security/cve/CVE-2020-36516" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2875-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2892-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/025152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.16.11. The mixed IPID assignment method with the hash-based IPID assignment policy allows an off-path attacker to inject data into a victim's TCP session or terminate that session.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-24"/>
	<updated date="2022-12-24"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36516/">CVE-2020-36516</cve>
	<bugzilla href="https://bugzilla.suse.com/1196616">SUSE bug 1196616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196867">SUSE bug 1196867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204092">SUSE bug 1204092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204183">SUSE bug 1204183</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009706514" comment="kernel-default-5.3.18-150300.59.90.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009706515" comment="kernel-default-base-5.3.18-150300.59.90.1.150300.18.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009707566" comment="kernel-rt-5.3.18-150300.99.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036557" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36557</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36557" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36557" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36557" ref_url="https://www.suse.com/security/cve/CVE-2020-36557" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2875-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2892-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
    <description>
    A race condition in the Linux kernel before 5.6.2 between the VT_DISALLOCATE ioctl and closing/opening of ttys could lead to a use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-24"/>
	<updated date="2023-02-16"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36557/">CVE-2020-36557</cve>
	<bugzilla href="https://bugzilla.suse.com/1201429">SUSE bug 1201429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201742">SUSE bug 1201742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202874">SUSE bug 1202874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205313">SUSE bug 1205313</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009706514" comment="kernel-default-5.3.18-150300.59.90.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009706515" comment="kernel-default-base-5.3.18-150300.59.90.1.150300.18.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009707566" comment="kernel-rt-5.3.18-150300.99.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36558</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36558" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36558" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36558" ref_url="https://www.suse.com/security/cve/CVE-2020-36558" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2875-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2892-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
    <description>
    A race condition in the Linux kernel before 5.5.7 involving VT_RESIZEX could lead to a NULL pointer dereference and general protection fault.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-24"/>
	<updated date="2023-02-16"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36558/">CVE-2020-36558</cve>
	<bugzilla href="https://bugzilla.suse.com/1200910">SUSE bug 1200910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201752">SUSE bug 1201752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205313">SUSE bug 1205313</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009706514" comment="kernel-default-5.3.18-150300.59.90.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009706515" comment="kernel-default-base-5.3.18-150300.59.90.1.150300.18.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009707566" comment="kernel-rt-5.3.18-150300.99.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8492</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8492" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8492" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8492" ref_url="https://www.suse.com/security/cve/CVE-2020-8492" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013149.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0274-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2332-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S3JTHM6LLDKL7VPNRJUSRPNZAD2FZ25H/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2333-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLGERALYYFTBIX3ZKPM6EQ2WJVUXLOXY/" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    Python 2.7 through 2.7.17, 3.5 through 3.5.9, 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1 allows an HTTP server to conduct Regular Expression Denial of Service (ReDoS) attacks against a client because of urllib.request.AbstractBasicAuthHandler catastrophic backtracking.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-30"/>
	<updated date="2023-03-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8492/">CVE-2020-8492</cve>
	<bugzilla href="https://bugzilla.suse.com/1162367">SUSE bug 1162367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009726610" comment="libpython3_6m1_0-3.6.15-150300.10.37.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009726611" comment="python3-3.6.15-150300.10.37.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009726612" comment="python3-base-3.6.15-150300.10.37.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20199</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20199" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20199" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20199" ref_url="https://www.suse.com/security/cve/CVE-2021-20199" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:23018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013710.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:23018-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5BA2TLW7O5ZURGQUAQUH4HD5SQYNDDZ6/" source="SUSE-SU"/>
    <description>
    Rootless containers run with Podman, receive all traffic with a source IP address of 127.0.0.1 (including from remote hosts). This impacts containerized applications that trust localhost (127.0.01) connections by default and do not require authentication. This issue affects Podman 1.8.0 onwards.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-10"/>
	<updated date="2023-02-10"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-20199/">CVE-2021-20199</cve>
	<bugzilla href="https://bugzilla.suse.com/1181640">SUSE bug 1181640</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009730379" comment="podman-4.3.1-150300.9.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266791" comment="podman is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009730380" comment="podman-cni-config-4.3.1-150300.9.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266792" comment="podman-cni-config is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20201</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20201" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20201" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20201" ref_url="https://www.suse.com/security/cve/CVE-2021-20201" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2881-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0874-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AINSWYQLD5FH4GUOEP5FWWA5CMFHTUDX/" source="SUSE-SU"/>
    <description>
    A flaw was found in spice in versions before 0.14.92. A DoS tool might make it easier for remote attackers to cause a denial of service (CPU consumption) by performing many renegotiations within a single connection.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-25"/>
	<updated date="2022-09-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20201/">CVE-2021-20201</cve>
	<bugzilla href="https://bugzilla.suse.com/1181686">SUSE bug 1181686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009707377" comment="libspice-server1-0.14.3-150300.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151923" comment="libspice-server1 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120206" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20206</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20206" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20206" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20206" ref_url="https://www.suse.com/security/cve/CVE-2021-20206" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2741-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-October/025850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013710.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0770-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WFIDXN6UAK2I4PPVFPBE4STNQH2FZQ4A/" source="SUSE-SU"/>
    <description>
    An improper limitation of path name flaw was found in containernetworking/cni in versions before 0.8.1. When specifying the plugin to load in the 'type' field in the network configuration, it is possible to use special elements such as "../" separators to reference binaries elsewhere on the system. This flaw allows an attacker to execute other existing binaries other than the cni plugins/types, such as 'reboot'. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-27"/>
	<updated date="2023-08-31"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20206/">CVE-2021-20206</cve>
	<bugzilla href="https://bugzilla.suse.com/1181961">SUSE bug 1181961</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
</definition>
<definition id="oval:org.opensuse.security:def:202120251" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20251</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20251" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20251" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20251" ref_url="https://www.suse.com/security/cve/CVE-2021-20251" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0222-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V3YTRBE2CLOHDFXSGJQCTU4DTNHNRTBU/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013975.html" source="SUSE-SU"/>
    <description>
    A flaw was found in samba. A race condition in the password lockout code may lead to the risk of brute force attacks being successful if special conditions are met.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-01-26"/>
	<updated date="2023-03-24"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20251/">CVE-2021-20251</cve>
	<bugzilla href="https://bugzilla.suse.com/1206546">SUSE bug 1206546</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208433">SUSE bug 1208433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209325">SUSE bug 1209325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209664">SUSE bug 1209664</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009732693" comment="samba-client-libs-4.15.13+git.591.ab36624310c-150300.3.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009666847" comment="samba-client-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22569</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22569" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22569" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22569" ref_url="https://www.suse.com/security/cve/CVE-2021-22569" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2783-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016228.html" source="SUSE-SU"/>
    <description>
    An issue in protobuf-java allowed the interleaving of com.google.protobuf.UnknownFieldSet fields in such a way that would be processed out of order. A small malicious payload can occupy the parser for several minutes by creating large numbers of short-lived objects that cause frequent, repeated pauses. We recommend upgrading libraries beyond the vulnerable versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-10"/>
	<updated date="2023-09-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-22569/">CVE-2021-22569</cve>
	<bugzilla href="https://bugzilla.suse.com/1194530">SUSE bug 1194530</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721859" comment="libprotobuf-lite20-3.9.2-150200.4.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677903" comment="libprotobuf-lite20 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202126341" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-26341</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-26341" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26341" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-26341" ref_url="https://www.suse.com/security/cve/CVE-2021-26341" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2424-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2422-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UCV6OZAODHO3XSCOPNA6KBP5EOWSRH4L/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2549-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YODNNJY6VGTGGVMUQLFLWV5FFYHIFW3C/" source="SUSE-SU"/>
    <description>
    Some AMD CPUs may transiently execute beyond unconditional direct branches, which may potentially result in data leakage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2023-02-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-26341/">CVE-2021-26341</cve>
	<bugzilla href="https://bugzilla.suse.com/1196901">SUSE bug 1196901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201050">SUSE bug 1201050</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705486" comment="kernel-default-5.3.18-150300.59.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705487" comment="kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009698643" comment="kernel-rt-5.3.18-150300.96.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28153</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28153" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28153" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28153" ref_url="https://www.suse.com/security/cve/CVE-2021-28153" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:795-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:833-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1455-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1758-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1758-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016101.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in GNOME GLib before 2.66.8. When g_file_replace() is used with G_FILE_CREATE_REPLACE_DESTINATION to replace a path that is a dangling symlink, it incorrectly also creates the target of the symlink as an empty file, which could conceivably have security relevance if the symlink is attacker-controlled. (If the path is a symlink to a file that already exists, then the contents of that file correctly remain unchanged.)
    </description>
<advisory from="security@suse.de">
	<issued date="2023-01-27"/>
	<updated date="2023-09-08"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-28153/">CVE-2021-28153</cve>
	<bugzilla href="https://bugzilla.suse.com/1183533">SUSE bug 1183533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009734986" comment="glib2-tools-2.62.6-150200.3.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151144" comment="glib2-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009734987" comment="libgio-2_0-0-2.62.6-150200.3.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151145" comment="libgio-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009734989" comment="libglib-2_0-0-2.62.6-150200.3.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151147" comment="libglib-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009734991" comment="libgmodule-2_0-0-2.62.6-150200.3.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151149" comment="libgmodule-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009734993" comment="libgobject-2_0-0-2.62.6-150200.3.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151151" comment="libgobject-2_0-0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28689</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28689" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28689" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28689" ref_url="https://www.suse.com/security/cve/CVE-2021-28689" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013122.html" source="SUSE-SU"/>
    <description>
    x86: Speculative vulnerabilities with bare (non-shim) 32-bit PV guests 32-bit x86 PV guest kernels run in ring 1. At the time when Xen was developed, this area of the i386 architecture was rarely used, which is why Xen was able to use it to implement paravirtualisation, Xen's novel approach to virtualization. In AMD64, Xen had to use a different implementation approach, so Xen does not use ring 1 to support 64-bit guests. With the focus now being on 64-bit systems, and the availability of explicit hardware support for virtualization, fixing speculation issues in ring 1 is not a priority for processor companies. Indirect Branch Restricted Speculation (IBRS) is an architectural x86 extension put together to combat speculative execution sidechannel attacks, including Spectre v2. It was retrofitted in microcode to existing CPUs. For more details on Spectre v2, see: http://xenbits.xen.org/xsa/advisory-254.html However, IBRS does not architecturally protect ring 0 from predictions learnt in ring 1. For more details, see: https://software.intel.com/security-software-guidance/deep-dives/deep-dive-indirect-branch-restricted-speculation Similar situations may exist with other mitigations for other kinds of speculative execution attacks. The situation is quite likely to be similar for speculative execution attacks which have yet to be discovered, disclosed, or mitigated.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-20"/>
	<updated date="2022-11-29"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28689/">CVE-2021-28689</cve>
	<bugzilla href="https://bugzilla.suse.com/1185104">SUSE bug 1185104</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009718861" comment="xen-libs-4.14.5_06-150300.3.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28861</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28861" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28861" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28861" ref_url="https://www.suse.com/security/cve/CVE-2021-28861" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3485-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CCKKVK6RUGD7FMGWHAMOVXOTAX4JRA2I/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3511-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3512-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/026107.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** Python 3.x through 3.10 has an open redirection vulnerability in lib/http/server.py due to no protection against multiple (/) at the beginning of URI path which may leads to information disclosure. NOTE: this is disputed by a third party because the http.server.html documentation page states "Warning: http.server is not recommended for production. It only implements basic security checks."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-10"/>
	<updated date="2023-02-10"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28861/">CVE-2021-28861</cve>
	<bugzilla href="https://bugzilla.suse.com/1202624">SUSE bug 1202624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204077">SUSE bug 1204077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204801">SUSE bug 1204801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204802">SUSE bug 1204802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205068">SUSE bug 1205068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205075">SUSE bug 1205075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205467">SUSE bug 1205467</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009716496" comment="libpython3_6m1_0-3.6.15-150300.10.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009716497" comment="python3-3.6.15-150300.10.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009716498" comment="python3-base-3.6.15-150300.10.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30560</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30560" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30560" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30560" ref_url="https://www.suse.com/security/cve/CVE-2021-30560" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1073-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EJ7H7GF4VL5FVVVYDBRQ4WEQNAFKJKEK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1074-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MEDHHJT7UKCU4N3Q5EL6PGUNNHXGEIYQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1095-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y5MSUD6KYHZ34U3ICGDUX4DAHAE4L7BB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1096-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UEADDZG3IJDGTQJEBACMOO23GKW2OSHR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Use after free in Blink XSLT in Google Chrome prior to 91.0.4472.164 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-10"/>
	<updated date="2023-09-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30560/">CVE-2021-30560</cve>
	<bugzilla href="https://bugzilla.suse.com/1188373">SUSE bug 1188373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208574">SUSE bug 1208574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211500">SUSE bug 1211500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211501">SUSE bug 1211501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211544">SUSE bug 1211544</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009742111" comment="libxslt1-1.1.32-150000.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009155748" comment="libxslt1 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202133061" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-33061</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-33061" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33061" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-33061" ref_url="https://www.suse.com/security/cve/CVE-2021-33061" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011744.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S2QMD6CJ6PZDFYQ3RKSOGAZNRK7WC5W7/" source="SUSE-SU"/>
    <description>
    Insufficient control flow management for the Intel(R) 82599 Ethernet Controllers and Adapters may allow an authenticated user to potentially enable denial of service via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2022-09-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33061/">CVE-2021-33061</cve>
	<bugzilla href="https://bugzilla.suse.com/1196426">SUSE bug 1196426</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009684736" comment="kernel-rt-5.3.18-150300.93.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202133655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-33655</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-33655" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33655" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-33655" ref_url="https://www.suse.com/security/cve/CVE-2021-33655" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2875-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2892-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
    <description>
    When sending malicous data to kernel by ioctl cmd FBIOPUT_VSCREENINFO,kernel will write memory out of bounds.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-24"/>
	<updated date="2023-06-14"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33655/">CVE-2021-33655</cve>
	<bugzilla href="https://bugzilla.suse.com/1201635">SUSE bug 1201635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202087">SUSE bug 1202087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205313">SUSE bug 1205313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212291">SUSE bug 1212291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009706514" comment="kernel-default-5.3.18-150300.59.90.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009706515" comment="kernel-default-base-5.3.18-150300.59.90.1.150300.18.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009707566" comment="kernel-rt-5.3.18-150300.99.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202133656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-33656</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-33656" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33656" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-33656" ref_url="https://www.suse.com/security/cve/CVE-2021-33656" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2875-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2892-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
    <description>
    When setting font with malicous data by ioctl cmd PIO_FONT,kernel will write memory out of bounds.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-24"/>
	<updated date="2023-06-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33656/">CVE-2021-33656</cve>
	<bugzilla href="https://bugzilla.suse.com/1201636">SUSE bug 1201636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212286">SUSE bug 1212286</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009706514" comment="kernel-default-5.3.18-150300.59.90.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009706515" comment="kernel-default-base-5.3.18-150300.59.90.1.150300.18.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009707566" comment="kernel-rt-5.3.18-150300.99.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3507</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3507" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3507" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3507" ref_url="https://www.suse.com/security/cve/CVE-2021-3507" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0879-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029043.html" source="SUSE-SU"/>
    <description>
    A heap buffer overflow was found in the floppy disk emulator of QEMU up to 6.0.0 (including). It could occur in fdctrl_transfer_handler() in hw/block/fdc.c while processing DMA read data transfers from the floppy drive to the guest system. A privileged guest user could use this flaw to crash the QEMU process on the host resulting in DoS scenario, or potential information leakage from the host memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-21"/>
	<updated date="2023-04-28"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3507/">CVE-2021-3507</cve>
	<bugzilla href="https://bugzilla.suse.com/1185000">SUSE bug 1185000</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744216" comment="qemu-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744217" comment="qemu-arm-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744220" comment="qemu-audio-spice-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623393" comment="qemu-audio-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744226" comment="qemu-chardev-spice-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623395" comment="qemu-chardev-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744227" comment="qemu-guest-agent-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744228" comment="qemu-hw-display-qxl-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623396" comment="qemu-hw-display-qxl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744488" comment="qemu-hw-display-virtio-gpu-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623397" comment="qemu-hw-display-virtio-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744231" comment="qemu-hw-display-virtio-vga-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623399" comment="qemu-hw-display-virtio-vga is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744232" comment="qemu-hw-usb-redirect-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623401" comment="qemu-hw-usb-redirect is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744233" comment="qemu-ipxe-1.0.0+-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744237" comment="qemu-seabios-1.14.0_0_g155821a-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744238" comment="qemu-sgabios-8-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744239" comment="qemu-tools-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744242" comment="qemu-ui-opengl-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623406" comment="qemu-ui-opengl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744244" comment="qemu-ui-spice-core-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623407" comment="qemu-ui-spice-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744245" comment="qemu-vgabios-1.14.0_0_g155821a-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744246" comment="qemu-x86-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3522</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3522" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3522" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3522" ref_url="https://www.suse.com/security/cve/CVE-2021-3522" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3916-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/026041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016338.html" source="SUSE-SU"/>
    <description>
    GStreamer before 1.18.4 may perform an out-of-bounds read when handling certain ID3v2 tags.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-09"/>
	<updated date="2023-09-28"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3522/">CVE-2021-3522</cve>
	<bugzilla href="https://bugzilla.suse.com/1185448">SUSE bug 1185448</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009710617" comment="gstreamer-plugins-base-1.16.3-150200.4.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153927" comment="gstreamer-plugins-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009710618" comment="libgstallocators-1_0-0-1.16.3-150200.4.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153932" comment="libgstallocators-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009710619" comment="libgstapp-1_0-0-1.16.3-150200.4.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153936" comment="libgstapp-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009710620" comment="libgstaudio-1_0-0-1.16.3-150200.4.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153938" comment="libgstaudio-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009710621" comment="libgstgl-1_0-0-1.16.3-150200.4.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153892" comment="libgstgl-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009710622" comment="libgstpbutils-1_0-0-1.16.3-150200.4.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153944" comment="libgstpbutils-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009710623" comment="libgstriff-1_0-0-1.16.3-150200.4.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153946" comment="libgstriff-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009710624" comment="libgsttag-1_0-0-1.16.3-150200.4.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153954" comment="libgsttag-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009710625" comment="libgstvideo-1_0-0-1.16.3-150200.4.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153956" comment="libgstvideo-1_0-0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3541</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3541" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3541" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3541" ref_url="https://www.suse.com/security/cve/CVE-2021-3541" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014596.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0886-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A7LMMGD465XPYHREX4OT47UCNFPO6QTF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1917-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AR6HBOC5J6QPVBH5GMPTQIK63SAT3C5S/" source="SUSE-SU"/>
    <description>
    A flaw was found in libxml2. Exponential entity expansion attack its possible bypassing all existing protection mechanisms and leading to denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-04-27"/>
	<updated date="2023-06-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3541/">CVE-2021-3541</cve>
	<bugzilla href="https://bugzilla.suse.com/1186015">SUSE bug 1186015</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009755256" comment="libxml2-2-2.9.7-150000.3.57.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151137" comment="libxml2-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009755259" comment="libxml2-tools-2.9.7-150000.3.57.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151140" comment="libxml2-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009755260" comment="python3-libxml2-python-2.9.7-150000.3.57.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177126" comment="python3-libxml2-python is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3593</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3593" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3593" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3593" ref_url="https://www.suse.com/security/cve/CVE-2021-3593" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/012010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1202-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XTOHNMISPT4N5NUXQJPKV5LQNNGSMFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2474-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LOEJDVTTKRPTW4JLAPXEN46YAGYFJMDT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2591-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W3DOLLXJN6UCIAFW2F6437T6CGXJTVQO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2941-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3NSGF4F642R2SF6X757XAA52XDMHLLL3/" source="SUSE-SU"/>
    <description>
    An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the udp6_input() function and could occur while processing a udp packet that is smaller than the size of the 'udphdr' structure. This issue may lead to out-of-bounds read access or indirect host memory disclosure to the guest. The highest threat from this vulnerability is to data confidentiality. This flaw affects libslirp versions prior to 4.6.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-31"/>
	<updated date="2023-09-15"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3593/">CVE-2021-3593</cve>
	<bugzilla href="https://bugzilla.suse.com/1187365">SUSE bug 1187365</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009707776" comment="libslirp0-4.3.1-150300.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009680725" comment="libslirp0 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3623</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3623" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3623" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3623" ref_url="https://www.suse.com/security/cve/CVE-2021-3623" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013225.html" source="SUSE-SU"/>
    <description>
    A flaw was found in libtpms. The flaw can be triggered by specially-crafted TPM 2 command packets containing illegal values and may lead to an out-of-bounds access when the volatile state of the TPM 2 is marshalled/written or unmarshalled/read. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-12-14"/>
	<updated date="2022-12-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3623/">CVE-2021-3623</cve>
	<bugzilla href="https://bugzilla.suse.com/1187767">SUSE bug 1187767</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009727204" comment="libtpms0-0.8.2-150300.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009632653" comment="libtpms0 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202136690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-36690</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-36690" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36690" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-36690" ref_url="https://www.suse.com/security/cve/CVE-2021-36690" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2666-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3307-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012378.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** A segmentation fault can occur in the sqlite3.exe command-line component of SQLite 3.36.0 via the idxGetTableInfo function when there is a crafted SQL query. NOTE: the vendor disputes the relevance of this report because a sqlite3.exe user already has full privileges (e.g., is intentionally allowed to execute commands). This report does NOT imply any problem in the SQLite library.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-20"/>
	<updated date="2023-06-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-36690/">CVE-2021-36690</cve>
	<bugzilla href="https://bugzilla.suse.com/1189802">SUSE bug 1189802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211963">SUSE bug 1211963</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009711219" comment="libsqlite3-0-3.39.3-150000.3.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153745" comment="libsqlite3-0 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3782</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3782" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3782" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3782" ref_url="https://www.suse.com/security/cve/CVE-2021-3782" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:1860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1873-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1874-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028840.html" source="SUSE-SU"/>
    <description>
    An internal reference count is held on the buffer pool, incremented every time a new buffer is created from the pool. The reference count is maintained as an int; on LP64 systems this can cause the reference count to overflow if the client creates a large number of wl_shm buffer objects, or if it can coerce the server to create a large number of external references to the buffer storage. With the reference count overflowing, a use-after-free can be constructed on the wl_shm_pool tracking structure, where values may be incremented or decremented; it may also be possible to construct a limited oracle to leak 4 bytes of server-side memory to the attacking client at a time.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-04-19"/>
	<updated date="2023-06-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-3782/">CVE-2021-3782</cve>
	<bugzilla href="https://bugzilla.suse.com/1190486">SUSE bug 1190486</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009754366" comment="libwayland-client0-1.18.0-150200.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009754352" comment="libwayland-client0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009754368" comment="libwayland-cursor0-1.18.0-150200.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009754354" comment="libwayland-cursor0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009754369" comment="libwayland-egl1-99~1.18.0-150200.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009754356" comment="libwayland-egl1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009754370" comment="libwayland-server0-1.18.0-150200.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009754358" comment="libwayland-server0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38578</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38578" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38578" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38578" ref_url="https://www.suse.com/security/cve/CVE-2021-38578" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:1921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1941-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1958-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1968-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2234-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029445.html" source="SUSE-SU"/>
    <description>
    Existing CommBuffer checks in SmmEntryPoint will not catch underflow when computing BufferSize.


    </description>
<advisory from="security@suse.de">
	<issued date="2023-04-25"/>
	<updated date="2023-07-23"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-38578/">CVE-2021-38578</cve>
	<bugzilla href="https://bugzilla.suse.com/1196741">SUSE bug 1196741</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009754737" comment="qemu-ovmf-x86_64-202008-150300.10.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231460" comment="qemu-ovmf-x86_64 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009754738" comment="qemu-uefi-aarch64-202008-150300.10.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623392" comment="qemu-uefi-aarch64 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213923" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3923</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3923" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3923" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3923" ref_url="https://www.suse.com/security/cve/CVE-2021-3923" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1800-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1801-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1803-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1811-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1848-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1892-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2232-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029439.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's implementation of RDMA over infiniband. An attacker with a privileged local account can leak kernel stack information when issuing commands to the /dev/infiniband/rdma_cm device node. While this access is unlikely to leak sensitive user information, it can be further used to defeat existing kernel protection mechanisms.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-04-12"/>
	<updated date="2023-06-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3923/">CVE-2021-3923</cve>
	<bugzilla href="https://bugzilla.suse.com/1209778">SUSE bug 1209778</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009753636" comment="kernel-default-5.3.18-150300.59.118.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009753637" comment="kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009753815" comment="kernel-rt-5.3.18-150300.124.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3928</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3928" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3928" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3928" ref_url="https://www.suse.com/security/cve/CVE-2021-3928" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0736-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0736-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FDNZ3N5S7UGKPUUKPGOQQGPJJK3YTW37/" source="SUSE-SU"/>
    <description>
    vim is vulnerable to Use of Uninitialized Variable
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-30"/>
	<updated date="2023-03-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-3928/">CVE-2021-3928</cve>
	<bugzilla href="https://bugzilla.suse.com/1192478">SUSE bug 1192478</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009726770" comment="vim-data-common-9.0.0814-150000.5.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009726850" comment="vim-small-9.0.0814-150000.5.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3929</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3929" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3929" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3929" ref_url="https://www.suse.com/security/cve/CVE-2021-3929" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016339.html" source="SUSE-SU"/>
    <description>
    A DMA reentrancy issue was found in the NVM Express Controller (NVME) emulation in QEMU. This CVE is similar to CVE-2021-3750 and, just like it, when the reentrancy write triggers the reset function nvme_ctrl_reset(), data structs will be freed leading to a use-after-free issue. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition or, potentially, executing arbitrary code within the context of the QEMU process on the host.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-21"/>
	<updated date="2023-09-28"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3929/">CVE-2021-3929</cve>
	<bugzilla href="https://bugzilla.suse.com/1193880">SUSE bug 1193880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744216" comment="qemu-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744217" comment="qemu-arm-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744220" comment="qemu-audio-spice-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623393" comment="qemu-audio-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744226" comment="qemu-chardev-spice-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623395" comment="qemu-chardev-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744227" comment="qemu-guest-agent-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744228" comment="qemu-hw-display-qxl-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623396" comment="qemu-hw-display-qxl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744488" comment="qemu-hw-display-virtio-gpu-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623397" comment="qemu-hw-display-virtio-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744231" comment="qemu-hw-display-virtio-vga-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623399" comment="qemu-hw-display-virtio-vga is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744232" comment="qemu-hw-usb-redirect-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623401" comment="qemu-hw-usb-redirect is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744233" comment="qemu-ipxe-1.0.0+-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744237" comment="qemu-seabios-1.14.0_0_g155821a-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744238" comment="qemu-sgabios-8-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744239" comment="qemu-tools-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744242" comment="qemu-ui-opengl-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623406" comment="qemu-ui-opengl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744244" comment="qemu-ui-spice-core-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623407" comment="qemu-ui-spice-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744245" comment="qemu-vgabios-1.14.0_0_g155821a-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744246" comment="qemu-x86-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3979</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3979" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3979" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3979" ref_url="https://www.suse.com/security/cve/CVE-2021-3979" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013249.html" source="SUSE-SU"/>
    <description>
    A key length flaw was found in Red Hat Ceph Storage. An attacker can exploit the fact that the key length is incorrectly passed in an encryption algorithm to create a non random key, which is weaker and can be exploited for loss of confidentiality and integrity on encrypted disks.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-12-17"/>
	<updated date="2022-12-17"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3979/">CVE-2021-3979</cve>
	<bugzilla href="https://bugzilla.suse.com/1194131">SUSE bug 1194131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009714703" comment="libfmt8-8.0.1-150300.7.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009729428" comment="libfmt8 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009714704" comment="librados2-16.2.9.536+g41a9f9a5573-150300.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154240" comment="librados2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009714705" comment="librbd1-16.2.9.536+g41a9f9a5573-150300.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154244" comment="librbd1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4024</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4024" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4024" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4024" ref_url="https://www.suse.com/security/cve/CVE-2021-4024" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:23018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013710.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:23018-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5BA2TLW7O5ZURGQUAQUH4HD5SQYNDDZ6/" source="SUSE-SU"/>
    <description>
    A flaw was found in podman. The `podman machine` function (used to create and manage Podman virtual machine containing a Podman process) spawns a `gvproxy` process on the host system. The `gvproxy` API is accessible on port 7777 on all IP addresses on the host. If that port is open on the host's firewall, an attacker can potentially use the `gvproxy` API to forward ports on the host to ports in the VM, making private services on the VM accessible to the network. This issue could be also used to interrupt the host's services by forwarding all ports to the VM.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-10"/>
	<updated date="2023-02-10"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4024/">CVE-2021-4024</cve>
	<bugzilla href="https://bugzilla.suse.com/1193166">SUSE bug 1193166</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009730379" comment="podman-4.3.1-150300.9.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266791" comment="podman is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009730380" comment="podman-cni-config-4.3.1-150300.9.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266792" comment="podman-cni-config is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214037" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4037</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4037" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4037" ref_url="https://www.suse.com/security/cve/CVE-2021-4037" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4273-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/026621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in the fs/inode.c:inode_init_owner() function logic of the LInux kernel that allows local users to create files for the XFS file-system with an unintended group ownership and with group execution and SGID permission bits set, in a scenario where a directory is SGID and belongs to a certain group and is writable by a user who is not a member of this group. This can lead to excessive permissions granted in case when they should not. This vulnerability is similar to the previous CVE-2018-13405 and adds the missed fix for the XFS.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-13"/>
	<updated date="2022-12-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-4037/">CVE-2021-4037</cve>
	<bugzilla href="https://bugzilla.suse.com/1198702">SUSE bug 1198702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724521" comment="kernel-default-5.3.18-150300.59.101.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724522" comment="kernel-default-base-5.3.18-150300.59.101.1.150300.18.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724435" comment="kernel-rt-5.3.18-150300.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202141190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-41190</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-41190" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41190" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-41190" ref_url="https://www.suse.com/security/cve/CVE-2021-41190" source="SUSE CVE"/>
		<reference ref_id="GHSA-qq97-vm5h-rrhg" ref_url="https://github.com/distribution/distribution/security/advisories//GHSA-qq97-vm5h-rrhg" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:282-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:23018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013710.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1525-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L3AGIEOXZIUUEYYMWKJCJCQI7V235UTR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0334-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ULRUJXC3YBVKDKJAERWLY6BKJ7U3246G/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:23018-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5BA2TLW7O5ZURGQUAQUH4HD5SQYNDDZ6/" source="SUSE-SU"/>
    <description>
    The OCI Distribution Spec project defines an API protocol to facilitate and standardize the distribution of content. In the OCI Distribution Specification version 1.0.0 and prior, the Content-Type header alone was used to determine the type of document during push and pull operations. Documents that contain both “manifests” and “layers” fields could be interpreted as either a manifest or an index in the absence of an accompanying Content-Type header. If a Content-Type header changed between two pulls of the same digest, a client may interpret the resulting content differently. The OCI Distribution Specification has been updated to require that a mediaType value present in a manifest or index match the Content-Type header used during the push and pull operations. Clients pulling from a registry may distrust the Content-Type header and reject an ambiguous document that contains both “manifests” and “layers” fields or “manifests” and “config” fields if they are unable to update to version 1.0.1 of the spec.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-10"/>
	<updated date="2023-05-12"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-41190/">CVE-2021-41190</cve>
	<bugzilla href="https://bugzilla.suse.com/1193273">SUSE bug 1193273</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009730379" comment="podman-4.3.1-150300.9.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266791" comment="podman is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009730380" comment="podman-cni-config-4.3.1-150300.9.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266792" comment="podman-cni-config is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4155</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4155" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4155" ref_url="https://www.suse.com/security/cve/CVE-2021-4155" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012771.html" source="SUSE-SU"/>
    <description>
    A data leak flaw was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS filesystem allowed for size increase of files with unaligned size. A local attacker could use this flaw to leak data on the XFS filesystem otherwise not accessible to them.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-15"/>
	<updated date="2022-11-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-4155/">CVE-2021-4155</cve>
	<bugzilla href="https://bugzilla.suse.com/1194272">SUSE bug 1194272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199255">SUSE bug 1199255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200084">SUSE bug 1200084</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009711223" comment="kernel-default-5.3.18-150300.59.93.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009711224" comment="kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721582" comment="kernel-rt-5.3.18-150300.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214157" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4157</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4157" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4157" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4157" ref_url="https://www.suse.com/security/cve/CVE-2021-4157" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2424-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011914.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2422-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UCV6OZAODHO3XSCOPNA6KBP5EOWSRH4L/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2549-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YODNNJY6VGTGGVMUQLFLWV5FFYHIFW3C/" source="SUSE-SU"/>
    <description>
    An out of memory bounds write flaw (1 or 2 bytes of memory) in the Linux kernel NFS subsystem was found in the way users use mirroring (replication of files with NFS). A user, having access to the NFS mount, could potentially use this flaw to crash the system or escalate privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2022-09-02"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-4157/">CVE-2021-4157</cve>
	<bugzilla href="https://bugzilla.suse.com/1194013">SUSE bug 1194013</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705486" comment="kernel-default-5.3.18-150300.59.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705487" comment="kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009698643" comment="kernel-rt-5.3.18-150300.96.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4203</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4203" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4203" ref_url="https://www.suse.com/security/cve/CVE-2021-4203" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/025152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1848-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2232-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029439.html" source="SUSE-SU"/>
    <description>
    A use-after-free read flaw was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (and connect()) in the Linux kernel. In this flaw, an attacker with a user privileges may crash the system or leak internal kernel information.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-15"/>
	<updated date="2023-05-18"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-4203/">CVE-2021-4203</cve>
	<bugzilla href="https://bugzilla.suse.com/1194535">SUSE bug 1194535</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009711223" comment="kernel-default-5.3.18-150300.59.93.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009711224" comment="kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721582" comment="kernel-rt-5.3.18-150300.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202142523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-42523</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-42523" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42523" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-42523" ref_url="https://www.suse.com/security/cve/CVE-2021-42523" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013216.html" source="SUSE-SU"/>
    <description>
    There are two Information Disclosure vulnerabilities in colord, and they lie in colord/src/cd-device-db.c and colord/src/cd-profile-db.c separately. They exist because the 'err_msg' of 'sqlite3_exec' is not releasing after use, while libxml2 emphasizes that the caller needs to release it.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-23"/>
	<updated date="2022-12-13"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-42523/">CVE-2021-42523</cve>
	<bugzilla href="https://bugzilla.suse.com/1202802">SUSE bug 1202802</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009716330" comment="libcolord2-1.4.4-150200.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151659" comment="libcolord2 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202144648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-44648</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-44648" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44648" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-44648" ref_url="https://www.suse.com/security/cve/CVE-2021-44648" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012198.html" source="SUSE-SU"/>
    <description>
    GNOME gdk-pixbuf 2.42.6 is vulnerable to a heap-buffer overflow vulnerability when decoding the lzw compressed stream of image data in GIF files with lzw minimum code size equals to 12.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-10"/>
	<updated date="2022-09-10"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-44648/">CVE-2021-44648</cve>
	<bugzilla href="https://bugzilla.suse.com/1194633">SUSE bug 1194633</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709963" comment="gdk-pixbuf-query-loaders-2.40.0-150200.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151616" comment="gdk-pixbuf-query-loaders is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709965" comment="libgdk_pixbuf-2_0-0-2.40.0-150200.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151618" comment="libgdk_pixbuf-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709966" comment="typelib-1_0-GdkPixbuf-2_0-2.40.0-150200.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151620" comment="typelib-1_0-GdkPixbuf-2_0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146828" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46828</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46828" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46828" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46828" ref_url="https://www.suse.com/security/cve/CVE-2021-46828" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2666-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2991-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012722.html" source="SUSE-SU"/>
    <description>
    In libtirpc before 1.3.3rc1, remote attackers could exhaust the file descriptors of a process that uses libtirpc because idle TCP connections are mishandled. This can, in turn, lead to an svc_run infinite loop without accepting new connections.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-20"/>
	<updated date="2023-04-29"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46828/">CVE-2021-46828</cve>
	<bugzilla href="https://bugzilla.suse.com/1201680">SUSE bug 1201680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206259">SUSE bug 1206259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209708">SUSE bug 1209708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009710626" comment="libtirpc-netconfig-1.2.6-150300.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009155752" comment="libtirpc-netconfig is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009710627" comment="libtirpc3-1.2.6-150300.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009155753" comment="libtirpc3 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46829</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46829" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46829" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46829" ref_url="https://www.suse.com/security/cve/CVE-2021-46829" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012066.html" source="SUSE-SU"/>
    <description>
    GNOME GdkPixbuf (aka GDK-PixBuf) before 2.42.8 allows a heap-based buffer overflow when compositing or clearing frames in GIF files, as demonstrated by io-gif-animation.c composite_frame. This overflow is controllable and could be abused for code execution, especially on 32-bit systems.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-03"/>
	<updated date="2022-09-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46829/">CVE-2021-46829</cve>
	<bugzilla href="https://bugzilla.suse.com/1201826">SUSE bug 1201826</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009707508" comment="gdk-pixbuf-query-loaders-2.40.0-150200.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151616" comment="gdk-pixbuf-query-loaders is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009707509" comment="libgdk_pixbuf-2_0-0-2.40.0-150200.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151618" comment="libgdk_pixbuf-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009707510" comment="typelib-1_0-GdkPixbuf-2_0-2.40.0-150200.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151620" comment="typelib-1_0-GdkPixbuf-2_0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46848</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46848" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46848" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46848" ref_url="https://www.suse.com/security/cve/CVE-2021-46848" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012776.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2794-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/025905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012773.html" source="SUSE-SU"/>
    <description>
    GNU Libtasn1 before 4.19.0 has an ETYPE_OK off-by-one array size check that affects asn1_encode_simple_der.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-27"/>
	<updated date="2023-04-29"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46848/">CVE-2021-46848</cve>
	<bugzilla href="https://bugzilla.suse.com/1204690">SUSE bug 1204690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205081">SUSE bug 1205081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205311">SUSE bug 1205311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208025">SUSE bug 1208025</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721360" comment="libtasn1-4.13-150000.4.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152119" comment="libtasn1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721361" comment="libtasn1-6-4.13-150000.4.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152120" comment="libtasn1-6 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0168</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0168" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0168" ref_url="https://www.suse.com/security/cve/CVE-2022-0168" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011353.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S2QMD6CJ6PZDFYQ3RKSOGAZNRK7WC5W7/" source="SUSE-SU"/>
    <description>
    A denial of service (DOS) issue was found in the Linux kernel’s smb2_ioctl_query_info function in the fs/cifs/smb2ops.c Common Internet File System (CIFS) due to an incorrect return from the memdup_user function. This flaw allows a local, privileged (CAP_SYS_ADMIN) attacker to crash the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2022-09-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0168/">CVE-2022-0168</cve>
	<bugzilla href="https://bugzilla.suse.com/1197472">SUSE bug 1197472</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009684736" comment="kernel-rt-5.3.18-150300.93.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0216</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0216" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0216" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0216" ref_url="https://www.suse.com/security/cve/CVE-2022-0216" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3795-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015047.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability was found in the LSI53C895A SCSI Host Bus Adapter emulation of QEMU. The flaw occurs while processing repeated messages to cancel the current SCSI request via the lsi_do_msgout function. This flaw allows a malicious privileged user within the guest to crash the QEMU process on the host, resulting in a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-20"/>
	<updated date="2023-06-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0216/">CVE-2022-0216</cve>
	<bugzilla href="https://bugzilla.suse.com/1198038">SUSE bug 1198038</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744216" comment="qemu-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744217" comment="qemu-arm-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744220" comment="qemu-audio-spice-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623393" comment="qemu-audio-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744226" comment="qemu-chardev-spice-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623395" comment="qemu-chardev-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744227" comment="qemu-guest-agent-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744228" comment="qemu-hw-display-qxl-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623396" comment="qemu-hw-display-qxl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744488" comment="qemu-hw-display-virtio-gpu-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623397" comment="qemu-hw-display-virtio-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744231" comment="qemu-hw-display-virtio-vga-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623399" comment="qemu-hw-display-virtio-vga is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744232" comment="qemu-hw-usb-redirect-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623401" comment="qemu-hw-usb-redirect is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744233" comment="qemu-ipxe-1.0.0+-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744237" comment="qemu-seabios-1.14.0_0_g155821a-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744238" comment="qemu-sgabios-8-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744239" comment="qemu-tools-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744242" comment="qemu-ui-opengl-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623406" comment="qemu-ui-opengl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744244" comment="qemu-ui-spice-core-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623407" comment="qemu-ui-spice-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744245" comment="qemu-vgabios-1.14.0_0_g155821a-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744246" comment="qemu-x86-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220561" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0561</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0561" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0561" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0561" ref_url="https://www.suse.com/security/cve/CVE-2022-0561" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012599.html" source="SUSE-SU"/>
    <description>
    Null source pointer passed as an argument to memcpy() function within TIFFFetchStripThing() in tif_dirread.c in libtiff versions from 3.9.0 to 4.3.0 could lead to Denial of Service via crafted TIFF file. For users that compile libtiff from sources, the fix is available with commit eecb0712.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-22"/>
	<updated date="2023-02-10"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0561/">CVE-2022-0561</cve>
	<bugzilla href="https://bugzilla.suse.com/1195964">SUSE bug 1195964</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009718763" comment="libtiff5-4.0.9-150000.45.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0670</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0670" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0670" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0670" ref_url="https://www.suse.com/security/cve/CVE-2022-0670" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1580-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1581-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1581-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1584-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028377.html" source="SUSE-SU"/>
    <description>
    A flaw was found in Openstack manilla owning a Ceph File system "share", which enables the owner to read/write any manilla share or entire file system. The vulnerability is due to a bug in the "volumes" plugin in Ceph Manager. This allows an attacker to compromise Confidentiality and Integrity of a file system. Fixed in RHCS 5.2 and Ceph 17.2.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-28"/>
	<updated date="2023-05-03"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-0670/">CVE-2022-0670</cve>
	<bugzilla href="https://bugzilla.suse.com/1201837">SUSE bug 1201837</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009750861" comment="librados2-16.2.11.58+g38d6afd3b78-150300.5.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154240" comment="librados2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009750862" comment="librbd1-16.2.11.58+g38d6afd3b78-150300.5.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154244" comment="librbd1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1012</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1012" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1012" ref_url="https://www.suse.com/security/cve/CVE-2022-1012" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2424-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012439.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2422-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UCV6OZAODHO3XSCOPNA6KBP5EOWSRH4L/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2549-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YODNNJY6VGTGGVMUQLFLWV5FFYHIFW3C/" source="SUSE-SU"/>
    <description>
    A memory leak problem was found in the TCP source port generation algorithm in net/ipv4/tcp.c due to the small table perturb size. This flaw may allow an attacker to information leak and may cause a denial of service problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2022-09-29"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1012/">CVE-2022-1012</cve>
	<bugzilla href="https://bugzilla.suse.com/1199482">SUSE bug 1199482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199694">SUSE bug 1199694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202335">SUSE bug 1202335</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705486" comment="kernel-default-5.3.18-150300.59.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705487" comment="kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009698643" comment="kernel-rt-5.3.18-150300.96.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1050</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1050" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1050" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1050" ref_url="https://www.suse.com/security/cve/CVE-2022-1050" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016339.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the QEMU implementation of VMWare's paravirtual RDMA device. This flaw allows a crafted guest driver to execute HW commands when shared buffers are not yet allocated, potentially leading to a use-after-free condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-21"/>
	<updated date="2023-09-28"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1050/">CVE-2022-1050</cve>
	<bugzilla href="https://bugzilla.suse.com/1197653">SUSE bug 1197653</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744216" comment="qemu-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744217" comment="qemu-arm-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744220" comment="qemu-audio-spice-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623393" comment="qemu-audio-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744226" comment="qemu-chardev-spice-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623395" comment="qemu-chardev-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744227" comment="qemu-guest-agent-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744228" comment="qemu-hw-display-qxl-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623396" comment="qemu-hw-display-qxl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744488" comment="qemu-hw-display-virtio-gpu-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623397" comment="qemu-hw-display-virtio-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744231" comment="qemu-hw-display-virtio-vga-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623399" comment="qemu-hw-display-virtio-vga is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744232" comment="qemu-hw-usb-redirect-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623401" comment="qemu-hw-usb-redirect is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744233" comment="qemu-ipxe-1.0.0+-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744237" comment="qemu-seabios-1.14.0_0_g155821a-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744238" comment="qemu-sgabios-8-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744239" comment="qemu-tools-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744242" comment="qemu-ui-opengl-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623406" comment="qemu-ui-opengl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744244" comment="qemu-ui-spice-core-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623407" comment="qemu-ui-spice-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744245" comment="qemu-vgabios-1.14.0_0_g155821a-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744246" comment="qemu-x86-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1116</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1116" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1116" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1116" ref_url="https://www.suse.com/security/cve/CVE-2022-1116" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2875-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2892-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012083.html" source="SUSE-SU"/>
    <description>
    Integer Overflow or Wraparound vulnerability in io_uring of Linux Kernel allows local attacker to cause memory corruption and escalate privileges to root. This issue affects: Linux Kernel versions prior to 5.4.189; version 5.4.24 and later versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-24"/>
	<updated date="2023-03-30"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1116/">CVE-2022-1116</cve>
	<bugzilla href="https://bugzilla.suse.com/1199647">SUSE bug 1199647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199648">SUSE bug 1199648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209225">SUSE bug 1209225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009706514" comment="kernel-default-5.3.18-150300.59.90.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009706515" comment="kernel-default-base-5.3.18-150300.59.90.1.150300.18.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009707566" comment="kernel-rt-5.3.18-150300.99.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1184</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1184" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1184" ref_url="https://www.suse.com/security/cve/CVE-2022-1184" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S2QMD6CJ6PZDFYQ3RKSOGAZNRK7WC5W7/" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in fs/ext4/namei.c:dx_insert_block() in the Linux kernel’s filesystem sub-component. This flaw allows a local attacker with a user privilege to cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2023-04-27"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1184/">CVE-2022-1184</cve>
	<bugzilla href="https://bugzilla.suse.com/1198577">SUSE bug 1198577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210859">SUSE bug 1210859</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009684736" comment="kernel-rt-5.3.18-150300.93.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221227" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1227</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1227" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1227" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1227" ref_url="https://www.suse.com/security/cve/CVE-2022-1227" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2839-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012032.html" source="SUSE-SU"/>
    <description>
    A privilege escalation flaw was found in Podman. This flaw allows an attacker to publish a malicious image to a public registry. Once this image is downloaded by a potential victim, the vulnerability is triggered after a user runs the 'podman top' command. This action gives the attacker access to the host filesystem, leading to information disclosure or denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-20"/>
	<updated date="2022-09-02"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1227/">CVE-2022-1227</cve>
	<bugzilla href="https://bugzilla.suse.com/1182428">SUSE bug 1182428</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705816" comment="podman-3.4.7-150300.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266791" comment="podman is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705632" comment="podman-cni-config-3.4.7-150300.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266792" comment="podman-cni-config is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1292</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1292" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1292" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1292" ref_url="https://www.suse.com/security/cve/CVE-2022-1292" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1404-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1417-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2251-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2306-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-July/023781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011468.html" source="SUSE-SU"/>
    <description>
    The c_rehash script does not properly sanitise shell metacharacters to prevent command injection. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.3 (Affected 3.0.0,3.0.1,3.0.2). Fixed in OpenSSL 1.1.1o (Affected 1.1.1-1.1.1n). Fixed in OpenSSL 1.0.2ze (Affected 1.0.2-1.0.2zd).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2023-04-29"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1292/">CVE-2022-1292</cve>
	<bugzilla href="https://bugzilla.suse.com/1199166">SUSE bug 1199166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200550">SUSE bug 1200550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200650">SUSE bug 1200650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200758">SUSE bug 1200758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202688">SUSE bug 1202688</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009693048" comment="libopenssl-1_1-devel-1.1.1d-150200.11.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231072" comment="libopenssl-1_1-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009693049" comment="libopenssl1_1-1.1.1d-150200.11.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177120" comment="libopenssl1_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009693050" comment="libopenssl1_1-hmac-1.1.1d-150200.11.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231074" comment="libopenssl1_1-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009693051" comment="openssl-1_1-1.1.1d-150200.11.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177122" comment="openssl-1_1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1462</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1462" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1462" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1462" ref_url="https://www.suse.com/security/cve/CVE-2022-1462" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2875-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2892-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read flaw was found in the Linux kernel’s TeleTYpe subsystem. The issue occurs in how a user triggers a race condition using ioctls TIOCSPTLCK and TIOCGPTPEER and TIOCSTI and TCXONC with leakage of memory in the flush_to_ldisc function. This flaw allows a local user to crash the system or read unauthorized random data from memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-24"/>
	<updated date="2023-02-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1462/">CVE-2022-1462</cve>
	<bugzilla href="https://bugzilla.suse.com/1198829">SUSE bug 1198829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009706514" comment="kernel-default-5.3.18-150300.59.90.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009706515" comment="kernel-default-base-5.3.18-150300.59.90.1.150300.18.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009707566" comment="kernel-rt-5.3.18-150300.99.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1586</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1586" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1586" ref_url="https://www.suse.com/security/cve/CVE-2022-1586" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1537-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1567-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011510.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2361-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y4CR4DFME33T3HFBI647RLLWYT5Q6FNN/" source="SUSE-SU"/>
    <description>
    An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2023-04-29"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1586/">CVE-2022-1586</cve>
	<bugzilla href="https://bugzilla.suse.com/1199232">SUSE bug 1199232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203032">SUSE bug 1203032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009692654" comment="libpcre1-8.45-150000.20.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152526" comment="libpcre1 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1587</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1587" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1587" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1587" ref_url="https://www.suse.com/security/cve/CVE-2022-1587" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011755.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2649-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZVHVSVNKKW7CC77JRUJ23MMS76WXHBBU/" source="SUSE-SU"/>
    <description>
    An out-of-bounds read vulnerability was discovered in the PCRE2 library in the get_recurse_data_length() function of the pcre2_jit_compile.c file. This issue affects recursions in JIT-compiled regular expressions caused by duplicate data transfers.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2023-02-10"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1587/">CVE-2022-1587</cve>
	<bugzilla href="https://bugzilla.suse.com/1199235">SUSE bug 1199235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201754">SUSE bug 1201754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203032">SUSE bug 1203032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009701289" comment="libpcre2-8-0-10.31-150000.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153653" comment="libpcre2-8-0 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1615</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1615" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1615" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1615" ref_url="https://www.suse.com/security/cve/CVE-2022-1615" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012944.html" source="SUSE-SU"/>
		<reference ref_id="TID000020879" ref_url="https://www.suse.com/support/kb/doc/?id=000020879" source="SUSE-SU"/>
    <description>
    In Samba, GnuTLS gnutls_rnd() can fail and give predictable random values.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-13"/>
	<updated date="2023-02-05"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1615/">CVE-2022-1615</cve>
	<bugzilla href="https://bugzilla.suse.com/1202976">SUSE bug 1202976</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709824" comment="samba-client-libs-4.15.8+git.527.8d0c05d313e-150300.3.40.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009666847" comment="samba-client-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1652</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1652" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1652" ref_url="https://www.suse.com/security/cve/CVE-2022-1652" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012349.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3409-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S2QMD6CJ6PZDFYQ3RKSOGAZNRK7WC5W7/" source="SUSE-SU"/>
    <description>
    Linux Kernel could allow a local attacker to execute arbitrary code on the system, caused by a concurrency use-after-free flaw in the bad_flp_intr function. By executing a specially-crafted program, an attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service condition on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2023-06-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1652/">CVE-2022-1652</cve>
	<bugzilla href="https://bugzilla.suse.com/1199063">SUSE bug 1199063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200057">SUSE bug 1200057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200751">SUSE bug 1200751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201832">SUSE bug 1201832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204132">SUSE bug 1204132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212307">SUSE bug 1212307</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009684736" comment="kernel-rt-5.3.18-150300.93.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1664</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1664" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1664" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1664" ref_url="https://www.suse.com/security/cve/CVE-2022-1664" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3099-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/026431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012992.html" source="SUSE-SU"/>
    <description>
    Dpkg::Source::Archive in dpkg, the Debian package management system, before version 1.21.8, 1.20.10, 1.19.8, 1.18.26 is prone to a directory traversal vulnerability. When extracting untrusted source packages in v2 and v3 source package formats that include a debian.tar, the in-place extraction can lead to directory traversal situations on specially crafted orig.tar and debian.tar tarballs.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-19"/>
	<updated date="2023-04-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1664/">CVE-2022-1664</cve>
	<bugzilla href="https://bugzilla.suse.com/1199944">SUSE bug 1199944</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
</definition>
<definition id="oval:org.opensuse.security:def:20221679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1679</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1679" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1679" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1679" ref_url="https://www.suse.com/security/cve/CVE-2022-1679" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2424-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2709-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-August/024351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-August/024349.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2422-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UCV6OZAODHO3XSCOPNA6KBP5EOWSRH4L/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2549-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YODNNJY6VGTGGVMUQLFLWV5FFYHIFW3C/" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in the Linux kernel’s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2023-06-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1679/">CVE-2022-1679</cve>
	<bugzilla href="https://bugzilla.suse.com/1199487">SUSE bug 1199487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201080">SUSE bug 1201080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201832">SUSE bug 1201832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204132">SUSE bug 1204132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212316">SUSE bug 1212316</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705486" comment="kernel-default-5.3.18-150300.59.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705487" comment="kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009698643" comment="kernel-rt-5.3.18-150300.96.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1706</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1706" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1706" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1706" ref_url="https://www.suse.com/security/cve/CVE-2022-1706" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2349-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2866-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012042.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in Ignition where ignition configs are accessible from unprivileged containers in VMs running on VMware products. This issue is only relevant in user environments where the Ignition config contains secrets. The highest threat from this vulnerability is to data confidentiality. Possible workaround is to not put secrets in the Ignition config.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2023-04-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1706/">CVE-2022-1706</cve>
	<bugzilla href="https://bugzilla.suse.com/1199524">SUSE bug 1199524</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705472" comment="ignition-2.14.0-150300.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009705498" comment="ignition is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705473" comment="ignition-dracut-grub2-2.14.0-150300.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009705499" comment="ignition-dracut-grub2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009698507" comment="systemd-presets-common-SUSE-15-150100.8.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009707504" comment="systemd-presets-common-SUSE is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221708" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1708</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1708" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1708" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1708" ref_url="https://www.suse.com/security/cve/CVE-2022-1708" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013379.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in CRI-O that causes memory or disk space exhaustion on the node for anyone with access to the Kube API. The ExecSync request runs commands in a container and logs the output of the command. This output is then read by CRI-O after command execution, and it is read in a manner where the entire file corresponding to the output of the command is read in. Thus, if the output of the command is large it is possible to exhaust the memory or the disk space of the node when CRI-O reads the output of the command. The highest threat from this vulnerability is system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-12-23"/>
	<updated date="2022-12-30"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1708/">CVE-2022-1708</cve>
	<bugzilla href="https://bugzilla.suse.com/1200285">SUSE bug 1200285</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009728998" comment="conmon-2.1.5-150300.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280795" comment="conmon is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1720</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1720" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1720" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1720" ref_url="https://www.suse.com/security/cve/CVE-2022-1720" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    Buffer Over-read in function grab_file_name in GitHub repository vim/vim prior to 8.2.4956. This vulnerability is capable of crashing the software, memory modification, and possible remote execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-10"/>
	<updated date="2022-12-28"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-1720/">CVE-2022-1720</cve>
	<bugzilla href="https://bugzilla.suse.com/1200732">SUSE bug 1200732</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709663" comment="vim-data-common-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709823" comment="vim-small-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1729</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1729" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1729" ref_url="https://www.suse.com/security/cve/CVE-2022-1729" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011744.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S2QMD6CJ6PZDFYQ3RKSOGAZNRK7WC5W7/" source="SUSE-SU"/>
    <description>
    A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2022-09-02"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1729/">CVE-2022-1729</cve>
	<bugzilla href="https://bugzilla.suse.com/1199507">SUSE bug 1199507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199697">SUSE bug 1199697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201832">SUSE bug 1201832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009684736" comment="kernel-rt-5.3.18-150300.93.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221941" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1941</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1941" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1941" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1941" ref_url="https://www.suse.com/security/cve/CVE-2022-1941" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2783-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016228.html" source="SUSE-SU"/>
    <description>
    A parsing vulnerability for the MessageSet type in the ProtocolBuffers versions prior to and including 3.16.1, 3.17.3, 3.18.2, 3.19.4, 3.20.1 and 3.21.5 for protobuf-cpp, and versions prior to and including 3.16.1, 3.17.3, 3.18.2, 3.19.4, 3.20.1 and 4.21.5 for protobuf-python can lead to out of memory failures. A specially crafted message with multiple key-value per elements creates parsing issues, and can lead to a Denial of Service against services receiving unsanitized input. We recommend upgrading to versions 3.18.3, 3.19.5, 3.20.2, 3.21.6 for protobuf-cpp and 3.18.3, 3.19.5, 3.20.2, 4.21.6 for protobuf-python. Versions for 3.16 and 3.17 are no longer updated.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-10"/>
	<updated date="2023-09-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1941/">CVE-2022-1941</cve>
	<bugzilla href="https://bugzilla.suse.com/1203681">SUSE bug 1203681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205141">SUSE bug 1205141</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721859" comment="libprotobuf-lite20-3.9.2-150200.4.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677903" comment="libprotobuf-lite20 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1966</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1966" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1966" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1966" ref_url="https://www.suse.com/security/cve/CVE-2022-1966" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011744.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CWOILJAA3L3ZOAEUSAUQRV4VH2BJEGVX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S2QMD6CJ6PZDFYQ3RKSOGAZNRK7WC5W7/" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-32250. Reason: This candidate is a duplicate of CVE-2022-32250. Notes: All CVE users should reference CVE-2022-32250 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2022-09-02"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1966/">CVE-2022-1966</cve>
	<bugzilla href="https://bugzilla.suse.com/1200015">SUSE bug 1200015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200268">SUSE bug 1200268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200494">SUSE bug 1200494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200529">SUSE bug 1200529</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705466" comment="kernel-default-5.3.18-150300.59.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705467" comment="kernel-default-base-5.3.18-150300.59.76.1.150300.18.45.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009684736" comment="kernel-rt-5.3.18-150300.93.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221968" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1968</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1968" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1968" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1968" ref_url="https://www.suse.com/security/cve/CVE-2022-1968" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    Use After Free in GitHub repository vim/vim prior to 8.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-10"/>
	<updated date="2022-12-28"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1968/">CVE-2022-1968</cve>
	<bugzilla href="https://bugzilla.suse.com/1200270">SUSE bug 1200270</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709663" comment="vim-data-common-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709823" comment="vim-small-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1972</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1972" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1972" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1972" ref_url="https://www.suse.com/security/cve/CVE-2022-1972" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S2QMD6CJ6PZDFYQ3RKSOGAZNRK7WC5W7/" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-2078. Reason: This candidate is a reservation duplicate of CVE-2022-2078. Notes: All CVE users should reference CVE-2022-2078 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2022-09-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1972/">CVE-2022-1972</cve>
	<bugzilla href="https://bugzilla.suse.com/1200019">SUSE bug 1200019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200266">SUSE bug 1200266</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009684736" comment="kernel-rt-5.3.18-150300.93.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1974</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1974" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1974" ref_url="https://www.suse.com/security/cve/CVE-2022-1974" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011744.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CWOILJAA3L3ZOAEUSAUQRV4VH2BJEGVX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S2QMD6CJ6PZDFYQ3RKSOGAZNRK7WC5W7/" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in the Linux kernel's NFC core functionality due to a race condition between kobject creation and delete. This vulnerability allows a local attacker with CAP_NET_ADMIN privilege to leak kernel information.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2022-09-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1974/">CVE-2022-1974</cve>
	<bugzilla href="https://bugzilla.suse.com/1200144">SUSE bug 1200144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200265">SUSE bug 1200265</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705466" comment="kernel-default-5.3.18-150300.59.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705467" comment="kernel-default-base-5.3.18-150300.59.76.1.150300.18.45.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009684736" comment="kernel-rt-5.3.18-150300.93.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1975</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1975" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1975" ref_url="https://www.suse.com/security/cve/CVE-2022-1975" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011744.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CWOILJAA3L3ZOAEUSAUQRV4VH2BJEGVX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S2QMD6CJ6PZDFYQ3RKSOGAZNRK7WC5W7/" source="SUSE-SU"/>
    <description>
    There is a sleep-in-atomic bug in /net/nfc/netlink.c that allows an attacker to crash the Linux kernel by simulating a nfc device from user-space.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2022-09-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.5/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1975/">CVE-2022-1975</cve>
	<bugzilla href="https://bugzilla.suse.com/1200143">SUSE bug 1200143</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705466" comment="kernel-default-5.3.18-150300.59.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705467" comment="kernel-default-base-5.3.18-150300.59.76.1.150300.18.45.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009684736" comment="kernel-rt-5.3.18-150300.93.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202220008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-20008</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-20008" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20008" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-20008" ref_url="https://www.suse.com/security/cve/CVE-2022-20008" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012772.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S2QMD6CJ6PZDFYQ3RKSOGAZNRK7WC5W7/" source="SUSE-SU"/>
    <description>
    In mmc_blk_read_single of block.c, there is a possible way to read kernel heap memory due to uninitialized data. This could lead to local information disclosure if reading from an SD card that triggers errors, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-216481035References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2022-11-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-20008/">CVE-2022-20008</cve>
	<bugzilla href="https://bugzilla.suse.com/1199564">SUSE bug 1199564</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721862" comment="kernel-default-5.3.18-150300.59.98.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721863" comment="kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009684736" comment="kernel-rt-5.3.18-150300.93.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202220132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-20132</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-20132" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20132" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-20132" ref_url="https://www.suse.com/security/cve/CVE-2022-20132" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2424-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2422-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UCV6OZAODHO3XSCOPNA6KBP5EOWSRH4L/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2549-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YODNNJY6VGTGGVMUQLFLWV5FFYHIFW3C/" source="SUSE-SU"/>
    <description>
    In lg_probe and related functions of hid-lg.c and other USB HID files, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure if a malicious USB HID device were plugged in, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-188677105References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2023-06-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-20132/">CVE-2022-20132</cve>
	<bugzilla href="https://bugzilla.suse.com/1200619">SUSE bug 1200619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212287">SUSE bug 1212287</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705486" comment="kernel-default-5.3.18-150300.59.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705487" comment="kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009698643" comment="kernel-rt-5.3.18-150300.96.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202220141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-20141</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-20141" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20141" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-20141" ref_url="https://www.suse.com/security/cve/CVE-2022-20141" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2709-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-August/024351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-August/024349.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011914.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S2QMD6CJ6PZDFYQ3RKSOGAZNRK7WC5W7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2422-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UCV6OZAODHO3XSCOPNA6KBP5EOWSRH4L/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2549-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YODNNJY6VGTGGVMUQLFLWV5FFYHIFW3C/" source="SUSE-SU"/>
    <description>
    In ip_check_mc_rcu of igmp.c, there is a possible use after free due to improper locking. This could lead to local escalation of privilege when opening and closing inet sockets with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-112551163References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2022-09-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-20141/">CVE-2022-20141</cve>
	<bugzilla href="https://bugzilla.suse.com/1200604">SUSE bug 1200604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200605">SUSE bug 1200605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203034">SUSE bug 1203034</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705486" comment="kernel-default-5.3.18-150300.59.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705487" comment="kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009684736" comment="kernel-rt-5.3.18-150300.93.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202220154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-20154</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-20154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20154" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-20154" ref_url="https://www.suse.com/security/cve/CVE-2022-20154" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2424-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011914.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2422-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UCV6OZAODHO3XSCOPNA6KBP5EOWSRH4L/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2549-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YODNNJY6VGTGGVMUQLFLWV5FFYHIFW3C/" source="SUSE-SU"/>
    <description>
    In lock_sock_nested of sock.c, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-174846563References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2022-09-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-20154/">CVE-2022-20154</cve>
	<bugzilla href="https://bugzilla.suse.com/1200599">SUSE bug 1200599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200608">SUSE bug 1200608</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705486" comment="kernel-default-5.3.18-150300.59.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705487" comment="kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009698643" comment="kernel-rt-5.3.18-150300.96.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202220166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-20166</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-20166" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20166" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-20166" ref_url="https://www.suse.com/security/cve/CVE-2022-20166" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2875-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2892-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
    <description>
    In various methods of kernel base drivers, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-182388481References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-24"/>
	<updated date="2023-06-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-20166/">CVE-2022-20166</cve>
	<bugzilla href="https://bugzilla.suse.com/1200598">SUSE bug 1200598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212284">SUSE bug 1212284</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009706514" comment="kernel-default-5.3.18-150300.59.90.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009706515" comment="kernel-default-base-5.3.18-150300.59.90.1.150300.18.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009707566" comment="kernel-rt-5.3.18-150300.99.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222031" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2031</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2031" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2031" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2031" ref_url="https://www.suse.com/security/cve/CVE-2022-2031" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2586-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013535.html" source="SUSE-SU"/>
    <description>
    A flaw was found in Samba. The security vulnerability occurs when KDC and the kpasswd service share a single account and set of keys, allowing them to decrypt each other's tickets. A user who has been requested to change their password, can exploit this flaw to obtain and use tickets to other services.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2023-03-24"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2031/">CVE-2022-2031</cve>
	<bugzilla href="https://bugzilla.suse.com/1201495">SUSE bug 1201495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202815">SUSE bug 1202815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202999">SUSE bug 1202999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205061">SUSE bug 1205061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208433">SUSE bug 1208433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209664">SUSE bug 1209664</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009703896" comment="libldb2-2.4.3-150300.3.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291435" comment="libldb2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009728218" comment="samba-client-libs-4.15.12+git.535.7750e5c95ef-150300.3.43.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009666847" comment="samba-client-libs is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202220368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-20368</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-20368" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20368" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-20368" ref_url="https://www.suse.com/security/cve/CVE-2022-20368" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/025152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
    <description>
    Product: AndroidVersions: Android kernelAndroid ID: A-224546354References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-15"/>
	<updated date="2023-06-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20368/">CVE-2022-20368</cve>
	<bugzilla href="https://bugzilla.suse.com/1202346">SUSE bug 1202346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212311">SUSE bug 1212311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009711223" comment="kernel-default-5.3.18-150300.59.93.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009711224" comment="kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721582" comment="kernel-rt-5.3.18-150300.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202220369" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-20369</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-20369" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20369" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-20369" ref_url="https://www.suse.com/security/cve/CVE-2022-20369" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/025152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
    <description>
    In v4l2_m2m_querybuf of v4l2-mem2mem.c, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-223375145References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-15"/>
	<updated date="2023-06-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20369/">CVE-2022-20369</cve>
	<bugzilla href="https://bugzilla.suse.com/1202347">SUSE bug 1202347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212321">SUSE bug 1212321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009711223" comment="kernel-default-5.3.18-150300.59.93.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009711224" comment="kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721582" comment="kernel-rt-5.3.18-150300.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222056" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2056</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2056" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2056" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2056" ref_url="https://www.suse.com/security/cve/CVE-2022-2056" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2647-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011758.html" source="SUSE-SU"/>
    <description>
    Divide By Zero error in tiffcrop in libtiff 4.4.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit f3a5e010.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2023-02-10"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2056/">CVE-2022-2056</cve>
	<bugzilla href="https://bugzilla.suse.com/1201176">SUSE bug 1201176</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705497" comment="libtiff5-4.0.9-150000.45.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222057" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2057</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2057" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2057" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2057" ref_url="https://www.suse.com/security/cve/CVE-2022-2057" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2647-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011758.html" source="SUSE-SU"/>
    <description>
    Divide By Zero error in tiffcrop in libtiff 4.4.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit f3a5e010.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2023-02-10"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2057/">CVE-2022-2057</cve>
	<bugzilla href="https://bugzilla.suse.com/1201175">SUSE bug 1201175</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705497" comment="libtiff5-4.0.9-150000.45.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2058</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2058" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2058" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2058" ref_url="https://www.suse.com/security/cve/CVE-2022-2058" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2647-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011758.html" source="SUSE-SU"/>
    <description>
    Divide By Zero error in tiffcrop in libtiff 4.4.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit f3a5e010.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2023-02-10"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2058/">CVE-2022-2058</cve>
	<bugzilla href="https://bugzilla.suse.com/1201174">SUSE bug 1201174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201175">SUSE bug 1201175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201176">SUSE bug 1201176</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705497" comment="libtiff5-4.0.9-150000.45.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2068</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2068" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2068" ref_url="https://www.suse.com/security/cve/CVE-2022-2068" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1404-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1417-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011349.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2251-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2306-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-July/023781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2309-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-July/023782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011468.html" source="SUSE-SU"/>
    <description>
    In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022-1292 was fixed it was not discovered that there are other places in the script where the file names of certificates being hashed were possibly passed to a command executed through the shell. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.4 (Affected 3.0.0,3.0.1,3.0.2,3.0.3). Fixed in OpenSSL 1.1.1p (Affected 1.1.1-1.1.1o). Fixed in OpenSSL 1.0.2zf (Affected 1.0.2-1.0.2ze).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2023-04-29"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2068/">CVE-2022-2068</cve>
	<bugzilla href="https://bugzilla.suse.com/1200550">SUSE bug 1200550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207568">SUSE bug 1207568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009693048" comment="libopenssl-1_1-devel-1.1.1d-150200.11.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231072" comment="libopenssl-1_1-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009693049" comment="libopenssl1_1-1.1.1d-150200.11.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177120" comment="libopenssl1_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009693050" comment="libopenssl1_1-hmac-1.1.1d-150200.11.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231074" comment="libopenssl1_1-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009693051" comment="openssl-1_1-1.1.1d-150200.11.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177122" comment="openssl-1_1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2097</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2097" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2097" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2097" ref_url="https://www.suse.com/security/cve/CVE-2022-2097" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1417-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2306-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-July/023781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2309-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-July/023782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2417-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011564.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2328-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YYPFZ7KMN6GQBF6OHSBFHNAHQ2AP2WBJ/" source="SUSE-SU"/>
    <description>
    AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimised implementation will not encrypt the entirety of the data under some circumstances. This could reveal sixteen bytes of data that was preexisting in the memory that wasn't written. In the special case of "in place" encryption, sixteen bytes of the plaintext would be revealed. Since OpenSSL does not support OCB based cipher suites for TLS and DTLS, they are both unaffected. Fixed in OpenSSL 3.0.5 (Affected 3.0.0-3.0.4). Fixed in OpenSSL 1.1.1q (Affected 1.1.1-1.1.1p).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2023-04-29"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-2097/">CVE-2022-2097</cve>
	<bugzilla href="https://bugzilla.suse.com/1201099">SUSE bug 1201099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201332">SUSE bug 1201332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009699141" comment="libopenssl-1_1-devel-1.1.1d-150200.11.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231072" comment="libopenssl-1_1-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009699142" comment="libopenssl1_1-1.1.1d-150200.11.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177120" comment="libopenssl1_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009699143" comment="libopenssl1_1-hmac-1.1.1d-150200.11.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231074" comment="libopenssl1_1-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009699144" comment="openssl-1_1-1.1.1d-150200.11.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177122" comment="openssl-1_1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221123" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21123</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21123" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21123" ref_url="https://www.suse.com/security/cve/CVE-2022-21123" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
		<reference ref_id="TID000020669" ref_url="https://www.suse.com/support/kb/doc/?id=000020669" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S2QMD6CJ6PZDFYQ3RKSOGAZNRK7WC5W7/" source="SUSE-SU"/>
    <description>
    Incomplete cleanup of multi-core shared buffers for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2023-03-10"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21123/">CVE-2022-21123</cve>
	<bugzilla href="https://bugzilla.suse.com/1199650">SUSE bug 1199650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200549">SUSE bug 1200549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209075">SUSE bug 1209075</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009684736" comment="kernel-rt-5.3.18-150300.93.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009702471" comment="xen-libs-4.14.5_04-150300.3.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21125</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21125" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21125" ref_url="https://www.suse.com/security/cve/CVE-2022-21125" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
		<reference ref_id="TID000020669" ref_url="https://www.suse.com/support/kb/doc/?id=000020669" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S2QMD6CJ6PZDFYQ3RKSOGAZNRK7WC5W7/" source="SUSE-SU"/>
    <description>
    Incomplete cleanup of microarchitectural fill buffers on some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2023-03-10"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21125/">CVE-2022-21125</cve>
	<bugzilla href="https://bugzilla.suse.com/1199650">SUSE bug 1199650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200549">SUSE bug 1200549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209074">SUSE bug 1209074</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009684736" comment="kernel-rt-5.3.18-150300.93.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009702471" comment="xen-libs-4.14.5_04-150300.3.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21127</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21127" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21127" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21127" ref_url="https://www.suse.com/security/cve/CVE-2022-21127" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
		<reference ref_id="TID000020669" ref_url="https://www.suse.com/support/kb/doc/?id=000020669" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S2QMD6CJ6PZDFYQ3RKSOGAZNRK7WC5W7/" source="SUSE-SU"/>
    <description>
    Incomplete cleanup in specific special register read operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2023-02-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21127/">CVE-2022-21127</cve>
	<bugzilla href="https://bugzilla.suse.com/1199650">SUSE bug 1199650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200549">SUSE bug 1200549</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009684736" comment="kernel-rt-5.3.18-150300.93.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21166</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21166" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21166" ref_url="https://www.suse.com/security/cve/CVE-2022-21166" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
		<reference ref_id="TID000020669" ref_url="https://www.suse.com/support/kb/doc/?id=000020669" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S2QMD6CJ6PZDFYQ3RKSOGAZNRK7WC5W7/" source="SUSE-SU"/>
    <description>
    Incomplete cleanup in specific special register write operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2023-03-10"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21166/">CVE-2022-21166</cve>
	<bugzilla href="https://bugzilla.suse.com/1199650">SUSE bug 1199650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200549">SUSE bug 1200549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209073">SUSE bug 1209073</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009684736" comment="kernel-rt-5.3.18-150300.93.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009702471" comment="xen-libs-4.14.5_04-150300.3.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21180</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21180" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21180" ref_url="https://www.suse.com/security/cve/CVE-2022-21180" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
		<reference ref_id="TID000020669" ref_url="https://www.suse.com/support/kb/doc/?id=000020669" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S2QMD6CJ6PZDFYQ3RKSOGAZNRK7WC5W7/" source="SUSE-SU"/>
    <description>
    Improper input validation for some Intel(R) Processors may allow an authenticated user to potentially cause a denial of service via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2023-06-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21180/">CVE-2022-21180</cve>
	<bugzilla href="https://bugzilla.suse.com/1199650">SUSE bug 1199650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200549">SUSE bug 1200549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212313">SUSE bug 1212313</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009684736" comment="kernel-rt-5.3.18-150300.93.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21216</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21216" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21216" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21216" ref_url="https://www.suse.com/security/cve/CVE-2022-21216" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0568-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013926.html" source="SUSE-SU"/>
    <description>
    Insufficient granularity of access control in out-of-band management in some Intel(R) Atom and Intel Xeon Scalable Processors may allow a privileged user to potentially enable escalation of privilege via adjacent network access.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-01"/>
	<updated date="2023-08-02"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-21216/">CVE-2022-21216</cve>
	<bugzilla href="https://bugzilla.suse.com/1208277">SUSE bug 1208277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209936">SUSE bug 1209936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211490">SUSE bug 1211490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211511">SUSE bug 1211511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213820">SUSE bug 1213820</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009739934" comment="ucode-intel-20230214-150200.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009169251" comment="ucode-intel is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21233</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21233" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21233" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21233" ref_url="https://www.suse.com/security/cve/CVE-2022-21233" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/012017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2960-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SKAJ7PAB3SJBSFPAUDYHFCK2LN5EP7WD/" source="SUSE-SU"/>
    <description>
    Improper isolation of shared resources in some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-01"/>
	<updated date="2022-09-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21233/">CVE-2022-21233</cve>
	<bugzilla href="https://bugzilla.suse.com/1201727">SUSE bug 1201727</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009706876" comment="ucode-intel-20220809-150200.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009169251" comment="ucode-intel is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222124" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2124</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2124" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2124" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2124" ref_url="https://www.suse.com/security/cve/CVE-2022-2124" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    Buffer Over-read in GitHub repository vim/vim prior to 8.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-10"/>
	<updated date="2022-12-28"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2124/">CVE-2022-2124</cve>
	<bugzilla href="https://bugzilla.suse.com/1200697">SUSE bug 1200697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709663" comment="vim-data-common-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709823" comment="vim-small-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2125</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2125" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2125" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2125" ref_url="https://www.suse.com/security/cve/CVE-2022-2125" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-10"/>
	<updated date="2022-12-28"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2125/">CVE-2022-2125</cve>
	<bugzilla href="https://bugzilla.suse.com/1200698">SUSE bug 1200698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205395">SUSE bug 1205395</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709663" comment="vim-data-common-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709823" comment="vim-small-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2126</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2126" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2126" ref_url="https://www.suse.com/security/cve/CVE-2022-2126" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-10"/>
	<updated date="2022-12-28"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2126/">CVE-2022-2126</cve>
	<bugzilla href="https://bugzilla.suse.com/1200700">SUSE bug 1200700</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709663" comment="vim-data-common-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709823" comment="vim-small-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2129</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2129" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2129" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2129" ref_url="https://www.suse.com/security/cve/CVE-2022-2129" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-10"/>
	<updated date="2022-12-28"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2129/">CVE-2022-2129</cve>
	<bugzilla href="https://bugzilla.suse.com/1200701">SUSE bug 1200701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709663" comment="vim-data-common-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709823" comment="vim-small-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21505</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21505" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21505" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21505" ref_url="https://www.suse.com/security/cve/CVE-2022-21505" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2875-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2892-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012040.html" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-24"/>
	<updated date="2022-10-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-21505/">CVE-2022-21505</cve>
	<bugzilla href="https://bugzilla.suse.com/1201458">SUSE bug 1201458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009706514" comment="kernel-default-5.3.18-150300.59.90.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009706515" comment="kernel-default-base-5.3.18-150300.59.90.1.150300.18.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009707566" comment="kernel-rt-5.3.18-150300.99.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2153</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2153" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2153" ref_url="https://www.suse.com/security/cve/CVE-2022-2153" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4273-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/026621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel’s KVM when attempting to set a SynIC IRQ. This issue makes it possible for a misbehaving VMM to write to SYNIC/STIMER MSRs, causing a NULL pointer dereference. This flaw allows an unprivileged local attacker on the host to issue specific ioctl calls, causing a kernel oops condition that results in a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-13"/>
	<updated date="2022-12-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2153/">CVE-2022-2153</cve>
	<bugzilla href="https://bugzilla.suse.com/1200788">SUSE bug 1200788</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724521" comment="kernel-default-5.3.18-150300.59.101.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724522" comment="kernel-default-base-5.3.18-150300.59.101.1.150300.18.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724435" comment="kernel-rt-5.3.18-150300.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21698</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21698" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21698" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21698" ref_url="https://www.suse.com/security/cve/CVE-2022-21698" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2839-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012709.html" source="SUSE-SU"/>
    <description>
    client_golang is the instrumentation library for Go applications in Prometheus, and the promhttp package in client_golang provides tooling around HTTP servers and clients. In client_golang prior to version 1.11.1, HTTP server is susceptible to a Denial of Service through unbounded cardinality, and potential memory exhaustion, when handling requests with non-standard HTTP methods. In order to be affected, an instrumented software must use any of `promhttp.InstrumentHandler*` middleware except `RequestsInFlight`; not filter any specific methods (e.g GET) before middleware; pass metric with `method` label name to our middleware; and not have any firewall/LB/proxy that filters away requests with unknown `method`. client_golang version 1.11.1 contains a patch for this issue. Several workarounds are available, including removing the `method` label name from counter/gauge used in the InstrumentHandler; turning off affected promhttp handlers; adding custom middleware before promhttp handler that will sanitize the request method given by Go http.Request; and using a reverse proxy or web application firewall, configured to only allow a limited set of methods.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-20"/>
	<updated date="2023-03-02"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-21698/">CVE-2022-21698</cve>
	<bugzilla href="https://bugzilla.suse.com/1196338">SUSE bug 1196338</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705816" comment="podman-3.4.7-150300.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266791" comment="podman is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705632" comment="podman-cni-config-3.4.7-150300.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266792" comment="podman-cni-config is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222175" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2175</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2175" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2175" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2175" ref_url="https://www.suse.com/security/cve/CVE-2022-2175" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    Buffer Over-read in GitHub repository vim/vim prior to 8.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-10"/>
	<updated date="2022-12-28"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2175/">CVE-2022-2175</cve>
	<bugzilla href="https://bugzilla.suse.com/1200904">SUSE bug 1200904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709663" comment="vim-data-common-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709823" comment="vim-small-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2182</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2182" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2182" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2182" ref_url="https://www.suse.com/security/cve/CVE-2022-2182" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-10"/>
	<updated date="2022-12-28"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2182/">CVE-2022-2182</cve>
	<bugzilla href="https://bugzilla.suse.com/1200903">SUSE bug 1200903</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709663" comment="vim-data-common-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709823" comment="vim-small-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2183</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2183" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2183" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2183" ref_url="https://www.suse.com/security/cve/CVE-2022-2183" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-10"/>
	<updated date="2022-12-28"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2183/">CVE-2022-2183</cve>
	<bugzilla href="https://bugzilla.suse.com/1200902">SUSE bug 1200902</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709663" comment="vim-data-common-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709823" comment="vim-small-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222206" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2206</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2206" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2206" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2206" ref_url="https://www.suse.com/security/cve/CVE-2022-2206" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-10"/>
	<updated date="2022-12-28"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2206/">CVE-2022-2206</cve>
	<bugzilla href="https://bugzilla.suse.com/1201155">SUSE bug 1201155</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709663" comment="vim-data-common-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709823" comment="vim-small-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2207</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2207" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2207" ref_url="https://www.suse.com/security/cve/CVE-2022-2207" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-10"/>
	<updated date="2022-12-28"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2207/">CVE-2022-2207</cve>
	<bugzilla href="https://bugzilla.suse.com/1201153">SUSE bug 1201153</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709663" comment="vim-data-common-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709823" comment="vim-small-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2208</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2208" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2208" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2208" ref_url="https://www.suse.com/security/cve/CVE-2022-2208" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.5163.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-10"/>
	<updated date="2022-12-28"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2208/">CVE-2022-2208</cve>
	<bugzilla href="https://bugzilla.suse.com/1201152">SUSE bug 1201152</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709663" comment="vim-data-common-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709823" comment="vim-small-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2210</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2210" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2210" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2210" ref_url="https://www.suse.com/security/cve/CVE-2022-2210" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-10"/>
	<updated date="2022-12-28"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-2210/">CVE-2022-2210</cve>
	<bugzilla href="https://bugzilla.suse.com/1201151">SUSE bug 1201151</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709663" comment="vim-data-common-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709823" comment="vim-small-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2231</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2231" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2231" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2231" ref_url="https://www.suse.com/security/cve/CVE-2022-2231" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-10"/>
	<updated date="2022-12-28"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2231/">CVE-2022-2231</cve>
	<bugzilla href="https://bugzilla.suse.com/1201150">SUSE bug 1201150</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709663" comment="vim-data-common-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709823" comment="vim-small-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222257" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2257</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2257" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2257" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2257" ref_url="https://www.suse.com/security/cve/CVE-2022-2257" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-10"/>
	<updated date="2022-12-28"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2257/">CVE-2022-2257</cve>
	<bugzilla href="https://bugzilla.suse.com/1201154">SUSE bug 1201154</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709663" comment="vim-data-common-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709823" comment="vim-small-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222264" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2264</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2264" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2264" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2264" ref_url="https://www.suse.com/security/cve/CVE-2022-2264" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-10"/>
	<updated date="2022-12-28"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2264/">CVE-2022-2264</cve>
	<bugzilla href="https://bugzilla.suse.com/1201132">SUSE bug 1201132</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709663" comment="vim-data-common-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709823" comment="vim-small-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2284</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2284" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2284" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2284" ref_url="https://www.suse.com/security/cve/CVE-2022-2284" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-10"/>
	<updated date="2022-12-28"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2284/">CVE-2022-2284</cve>
	<bugzilla href="https://bugzilla.suse.com/1201133">SUSE bug 1201133</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709663" comment="vim-data-common-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709823" comment="vim-small-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2285</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2285" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2285" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2285" ref_url="https://www.suse.com/security/cve/CVE-2022-2285" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    Integer Overflow or Wraparound in GitHub repository vim/vim prior to 9.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-10"/>
	<updated date="2022-12-28"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-2285/">CVE-2022-2285</cve>
	<bugzilla href="https://bugzilla.suse.com/1201134">SUSE bug 1201134</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709663" comment="vim-data-common-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709823" comment="vim-small-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222286" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2286</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2286" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2286" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2286" ref_url="https://www.suse.com/security/cve/CVE-2022-2286" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-10"/>
	<updated date="2022-12-28"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2286/">CVE-2022-2286</cve>
	<bugzilla href="https://bugzilla.suse.com/1201135">SUSE bug 1201135</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709663" comment="vim-data-common-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709823" comment="vim-small-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2287</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2287" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2287" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2287" ref_url="https://www.suse.com/security/cve/CVE-2022-2287" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-10"/>
	<updated date="2022-12-28"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2287/">CVE-2022-2287</cve>
	<bugzilla href="https://bugzilla.suse.com/1201136">SUSE bug 1201136</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709663" comment="vim-data-common-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709823" comment="vim-small-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22967</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22967" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22967" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22967" ref_url="https://www.suse.com/security/cve/CVE-2022-22967" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:15036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:15037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:15038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:15041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2178-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011412.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012174.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in SaltStack Salt in versions before 3002.9, 3003.5, 3004.2. PAM auth fails to reject locked accounts, which allows a previously authorized user whose account is locked still run Salt commands when their account is locked. This affects both local shell accounts with an active session and salt-api users that authenticate via PAM eauth.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2022-09-09"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22967/">CVE-2022-22967</cve>
	<bugzilla href="https://bugzilla.suse.com/1200566">SUSE bug 1200566</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705468" comment="python3-salt-3004-150300.53.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174860" comment="python3-salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705469" comment="salt-3004-150300.53.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153592" comment="salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705470" comment="salt-minion-3004-150300.53.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153599" comment="salt-minion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705471" comment="salt-transactional-update-3004-150300.53.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479908" comment="salt-transactional-update is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2304</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2304" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2304" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2304" ref_url="https://www.suse.com/security/cve/CVE-2022-2304" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    Stack-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-10"/>
	<updated date="2022-12-28"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-2304/">CVE-2022-2304</cve>
	<bugzilla href="https://bugzilla.suse.com/1201249">SUSE bug 1201249</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709663" comment="vim-data-common-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709823" comment="vim-small-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222318" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2318</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2318" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2318" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2318" ref_url="https://www.suse.com/security/cve/CVE-2022-2318" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2875-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2892-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
    <description>
    There are use-after-free vulnerabilities caused by timer handler in net/rose/rose_timer.c of linux that allow attackers to crash linux kernel without any privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-24"/>
	<updated date="2023-06-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2318/">CVE-2022-2318</cve>
	<bugzilla href="https://bugzilla.suse.com/1201251">SUSE bug 1201251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212303">SUSE bug 1212303</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009706514" comment="kernel-default-5.3.18-150300.59.90.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009706515" comment="kernel-default-base-5.3.18-150300.59.90.1.150300.18.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009707566" comment="kernel-rt-5.3.18-150300.99.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202223303" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-23303</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-23303" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23303" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-23303" ref_url="https://www.suse.com/security/cve/CVE-2022-23303" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0716-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011164.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0716-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YZLUSHYXTE7JA3KCOVKZ5L36DTZE7VZM/" source="SUSE-SU"/>
    <description>
    The implementations of SAE in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side channel attacks as a result of cache access patterns. NOTE: this issue exists because of an incomplete fix for CVE-2019-9494.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2022-11-05"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23303/">CVE-2022-23303</cve>
	<bugzilla href="https://bugzilla.suse.com/1194732">SUSE bug 1194732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205064">SUSE bug 1205064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009669199" comment="wpa_supplicant-2.9-4.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152145" comment="wpa_supplicant is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202223304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-23304</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-23304" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23304" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-23304" ref_url="https://www.suse.com/security/cve/CVE-2022-23304" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0716-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011164.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0716-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YZLUSHYXTE7JA3KCOVKZ5L36DTZE7VZM/" source="SUSE-SU"/>
    <description>
    The implementations of EAP-pwd in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side-channel attacks as a result of cache access patterns. NOTE: this issue exists because of an incomplete fix for CVE-2019-9495.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2022-11-05"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23304/">CVE-2022-23304</cve>
	<bugzilla href="https://bugzilla.suse.com/1194733">SUSE bug 1194733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205064">SUSE bug 1205064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009669199" comment="wpa_supplicant-2.9-4.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152145" comment="wpa_supplicant is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222343" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2343</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2343" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2343" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2343" ref_url="https://www.suse.com/security/cve/CVE-2022-2343" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0044.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-10"/>
	<updated date="2022-12-28"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2343/">CVE-2022-2343</cve>
	<bugzilla href="https://bugzilla.suse.com/1201356">SUSE bug 1201356</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709663" comment="vim-data-common-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709823" comment="vim-small-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222344" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2344</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2344" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2344" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2344" ref_url="https://www.suse.com/security/cve/CVE-2022-2344" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0045.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-10"/>
	<updated date="2022-12-28"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2344/">CVE-2022-2344</cve>
	<bugzilla href="https://bugzilla.suse.com/1201359">SUSE bug 1201359</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709663" comment="vim-data-common-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709823" comment="vim-small-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2345</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2345" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2345" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2345" ref_url="https://www.suse.com/security/cve/CVE-2022-2345" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    Use After Free in GitHub repository vim/vim prior to 9.0.0046.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-10"/>
	<updated date="2022-12-28"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2345/">CVE-2022-2345</cve>
	<bugzilla href="https://bugzilla.suse.com/1201363">SUSE bug 1201363</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709663" comment="vim-data-common-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709823" comment="vim-small-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202223471" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-23471</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-23471" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23471" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-23471" ref_url="https://www.suse.com/security/cve/CVE-2022-23471" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4409-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013228.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028424.html" source="SUSE-SU"/>
    <description>
    containerd is an open source container runtime. A bug was found in containerd's CRI implementation where a user can exhaust memory on the host. In the CRI stream server, a goroutine is launched to handle terminal resize events if a TTY is requested. If the user's process fails to launch due to, for example, a faulty command, the goroutine will be stuck waiting to send without a receiver, resulting in a memory leak. Kubernetes and crictl can both be configured to use containerd's CRI implementation and the stream server is used for handling container IO. This bug has been fixed in containerd 1.6.12 and 1.5.16. Users should update to these versions to resolve the issue. Users unable to upgrade should ensure that only trusted images and commands are used and that only trusted users have permissions to execute commands in running containers.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-12-14"/>
	<updated date="2023-06-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23471/">CVE-2022-23471</cve>
	<bugzilla href="https://bugzilla.suse.com/1206235">SUSE bug 1206235</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744976" comment="containerd-1.6.16-150000.82.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153864" comment="containerd is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202223491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-23491</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-23491" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23491" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-23491" ref_url="https://www.suse.com/security/cve/CVE-2022-23491" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013525.html" source="SUSE-SU"/>
    <description>
    Certifi is a curated collection of Root Certificates for validating the trustworthiness of SSL certificates while verifying the identity of TLS hosts. Certifi 2022.12.07 removes root certificates from "TrustCor" from the root store. These are in the process of being removed from Mozilla's trust store. TrustCor's root certificates are being removed pursuant to an investigation prompted by media reporting that TrustCor's ownership also operated a business that produced spyware. Conclusions of Mozilla's investigation can be found in the linked google group discussion.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-01-25"/>
	<updated date="2023-09-19"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23491/">CVE-2022-23491</cve>
	<bugzilla href="https://bugzilla.suse.com/1206212">SUSE bug 1206212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207038">SUSE bug 1207038</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009732313" comment="libfreebl3-3.79.3-150000.3.90.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009732315" comment="libfreebl3-hmac-3.79.3-150000.3.90.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244408" comment="libfreebl3-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009732317" comment="libsoftokn3-3.79.3-150000.3.90.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009732319" comment="libsoftokn3-hmac-3.79.3-150000.3.90.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244410" comment="libsoftokn3-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009732321" comment="mozilla-nss-3.79.3-150000.3.90.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009732323" comment="mozilla-nss-certs-3.79.3-150000.3.90.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009732328" comment="mozilla-nss-tools-3.79.3-150000.3.90.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009731091" comment="python3-certifi-2018.1.18-150000.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009734983" comment="python3-certifi is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202223816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-23816</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-23816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23816" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-23816" ref_url="https://www.suse.com/security/cve/CVE-2022-23816" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011717.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate is unused by its CNA. Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2023-01-18"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-23816/">CVE-2022-23816</cve>
	<bugzilla href="https://bugzilla.suse.com/1201456">SUSE bug 1201456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201469">SUSE bug 1201469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009702471" comment="xen-libs-4.14.5_04-150300.3.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202223824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-23824</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-23824" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23824" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-23824" ref_url="https://www.suse.com/security/cve/CVE-2022-23824" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0136-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014000.html" source="SUSE-SU"/>
    <description>
    IBPB may not prevent return branch predictions from being specified by pre-IBPB branch targets leading to a potential information disclosure.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-01-26"/>
	<updated date="2023-03-18"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-23824/">CVE-2022-23824</cve>
	<bugzilla href="https://bugzilla.suse.com/1205209">SUSE bug 1205209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009733697" comment="xen-libs-4.14.5_10-150300.3.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202223825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-23825</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-23825" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-23825" ref_url="https://www.suse.com/security/cve/CVE-2022-23825" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011717.html" source="SUSE-SU"/>
		<reference ref_id="TID000020693" ref_url="https://www.suse.com/support/kb/doc/?id=000020693" source="SUSE-SU"/>
    <description>
    Aliases in the branch predictor may cause some AMD processors to predict the wrong branch type potentially leading to information disclosure.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2022-11-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-23825/">CVE-2022-23825</cve>
	<bugzilla href="https://bugzilla.suse.com/1201457">SUSE bug 1201457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201469">SUSE bug 1201469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205209">SUSE bug 1205209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009702471" comment="xen-libs-4.14.5_04-150300.3.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202224795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-24795</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-24795" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24795" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-24795" ref_url="https://www.suse.com/security/cve/CVE-2022-24795" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1746-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012163.html" source="SUSE-SU"/>
    <description>
    yajl-ruby is a C binding to the YAJL JSON parsing and generation library. The 1.x branch and the 2.x branch of `yajl` contain an integer overflow which leads to subsequent heap memory corruption when dealing with large (~2GB) inputs. The reallocation logic at `yajl_buf.c#L64` may result in the `need` 32bit integer wrapping to 0 when `need` approaches a value of 0x80000000 (i.e. ~2GB of data), which results in a reallocation of buf-&gt;alloc into a small heap chunk. These integers are declared as `size_t` in the 2.x branch of `yajl`, which practically prevents the issue from triggering on 64bit platforms, however this does not preclude this issue triggering on 32bit builds on which `size_t` is a 32bit integer. Subsequent population of this under-allocated heap chunk is based on the original buffer size, leading to heap memory corruption. This vulnerability mostly impacts process availability. Maintainers believe exploitation for arbitrary code execution is unlikely. A patch is available and anticipated to be part of yajl-ruby version 1.4.2. As a workaround, avoid passing large inputs to YAJL.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-08"/>
	<updated date="2022-10-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24795/">CVE-2022-24795</cve>
	<bugzilla href="https://bugzilla.suse.com/1198405">SUSE bug 1198405</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009706516" comment="libyajl2-2.1.0-150000.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009710095" comment="libyajl2 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2503</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2503" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2503" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2503" ref_url="https://www.suse.com/security/cve/CVE-2022-2503" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012772.html" source="SUSE-SU"/>
    <description>
    Dm-verity is used for extending root-of-trust to root filesystems. LoadPin builds on this property to restrict module/firmware loads to just the trusted root filesystem. Device-mapper table reloads currently allow users with root privileges to switch out the target with an equivalent dm-linear target and bypass verification till reboot. This allows root to bypass LoadPin and can be used to load untrusted and unverified kernel modules and firmware, which implies arbitrary kernel execution and persistence for peripherals that do not verify firmware updates. We recommend upgrading past commit 4caae58406f8ceb741603eee460d79bacca9b1b5
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-27"/>
	<updated date="2022-11-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2503/">CVE-2022-2503</cve>
	<bugzilla href="https://bugzilla.suse.com/1202677">SUSE bug 1202677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721862" comment="kernel-default-5.3.18-150300.59.98.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721863" comment="kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721582" comment="kernel-rt-5.3.18-150300.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222509" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2509</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2509" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2509" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2509" ref_url="https://www.suse.com/security/cve/CVE-2022-2509" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/012004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2882-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JAQLUGC23B5QJHCL4H7XZA5J2ZZWYDUP/" source="SUSE-SU"/>
    <description>
    A vulnerability found in gnutls. This security flaw happens because of a double free error occurs during verification of pkcs7 signatures in gnutls_pkcs7_verify function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-25"/>
	<updated date="2023-04-29"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2509/">CVE-2022-2509</cve>
	<bugzilla href="https://bugzilla.suse.com/1202020">SUSE bug 1202020</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202593">SUSE bug 1202593</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705700" comment="gnutls-3.6.7-150200.14.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151156" comment="gnutls is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705702" comment="libgnutls30-3.6.7-150200.14.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177128" comment="libgnutls30 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705703" comment="libgnutls30-hmac-3.6.7-150200.14.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281488" comment="libgnutls30-hmac is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2519</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2519" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2519" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2519" ref_url="https://www.suse.com/security/cve/CVE-2022-2519" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012599.html" source="SUSE-SU"/>
    <description>
    There is a double free or corruption in rotateImage() at tiffcrop.c:8839 found in libtiff 4.4.0rc1
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-22"/>
	<updated date="2023-02-13"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-2519/">CVE-2022-2519</cve>
	<bugzilla href="https://bugzilla.suse.com/1202968">SUSE bug 1202968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205505">SUSE bug 1205505</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009718763" comment="libtiff5-4.0.9-150000.45.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2520</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2520" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2520" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2520" ref_url="https://www.suse.com/security/cve/CVE-2022-2520" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012599.html" source="SUSE-SU"/>
    <description>
    A flaw was found in libtiff 4.4.0rc1. There is a sysmalloc assertion fail in rotateImage() at tiffcrop.c:8621 that can cause program crash when reading a crafted input.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-22"/>
	<updated date="2023-02-13"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2520/">CVE-2022-2520</cve>
	<bugzilla href="https://bugzilla.suse.com/1202973">SUSE bug 1202973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009718763" comment="libtiff5-4.0.9-150000.45.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2521</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2521" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2521" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2521" ref_url="https://www.suse.com/security/cve/CVE-2022-2521" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012599.html" source="SUSE-SU"/>
    <description>
    It was found in libtiff 4.4.0rc1 that there is an invalid pointer free operation in TIFFClose() at tif_close.c:131 called by tiffcrop.c:2522 that can cause a program crash and denial of service while processing crafted input.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-22"/>
	<updated date="2023-02-13"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2521/">CVE-2022-2521</cve>
	<bugzilla href="https://bugzilla.suse.com/1202971">SUSE bug 1202971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205505">SUSE bug 1205505</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009718763" comment="libtiff5-4.0.9-150000.45.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2522</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2522" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2522" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2522" ref_url="https://www.suse.com/security/cve/CVE-2022-2522" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0061.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-10"/>
	<updated date="2022-12-28"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2522/">CVE-2022-2522</cve>
	<bugzilla href="https://bugzilla.suse.com/1201863">SUSE bug 1201863</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709663" comment="vim-data-common-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709823" comment="vim-small-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2571</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2571" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2571" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2571" ref_url="https://www.suse.com/security/cve/CVE-2022-2571" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0101.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-10"/>
	<updated date="2022-12-28"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-2571/">CVE-2022-2571</cve>
	<bugzilla href="https://bugzilla.suse.com/1202046">SUSE bug 1202046</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709663" comment="vim-data-common-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709823" comment="vim-small-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222580" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2580</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2580" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2580" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2580" ref_url="https://www.suse.com/security/cve/CVE-2022-2580" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0102.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-10"/>
	<updated date="2022-12-28"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-2580/">CVE-2022-2580</cve>
	<bugzilla href="https://bugzilla.suse.com/1202049">SUSE bug 1202049</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709663" comment="vim-data-common-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709823" comment="vim-small-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2581</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2581" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2581" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2581" ref_url="https://www.suse.com/security/cve/CVE-2022-2581" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.0104.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-10"/>
	<updated date="2022-12-28"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-2581/">CVE-2022-2581</cve>
	<bugzilla href="https://bugzilla.suse.com/1202050">SUSE bug 1202050</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709663" comment="vim-data-common-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709823" comment="vim-small-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2586</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2586" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2586" ref_url="https://www.suse.com/security/cve/CVE-2022-2586" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-27"/>
	<updated date="2023-04-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2586/">CVE-2022-2586</cve>
	<bugzilla href="https://bugzilla.suse.com/1202095">SUSE bug 1202095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209719">SUSE bug 1209719</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721862" comment="kernel-default-5.3.18-150300.59.98.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721863" comment="kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721582" comment="kernel-rt-5.3.18-150300.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2588</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2588" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2588" ref_url="https://www.suse.com/security/cve/CVE-2022-2588" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/025152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-15"/>
	<updated date="2023-03-30"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2588/">CVE-2022-2588</cve>
	<bugzilla href="https://bugzilla.suse.com/1202096">SUSE bug 1202096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203613">SUSE bug 1203613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204183">SUSE bug 1204183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209225">SUSE bug 1209225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009711223" comment="kernel-default-5.3.18-150300.59.93.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009711224" comment="kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721582" comment="kernel-rt-5.3.18-150300.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2598</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2598" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2598" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2598" ref_url="https://www.suse.com/security/cve/CVE-2022-2598" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    Out-of-bounds Write to API in GitHub repository vim/vim prior to 9.0.0100.


    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-10"/>
	<updated date="2023-07-12"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2598/">CVE-2022-2598</cve>
	<bugzilla href="https://bugzilla.suse.com/1202051">SUSE bug 1202051</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709663" comment="vim-data-common-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709823" comment="vim-small-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2601</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2601" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2601" ref_url="https://www.suse.com/security/cve/CVE-2022-2601" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014265.html" source="SUSE-SU"/>
		<reference ref_id="TID000021048" ref_url="https://www.suse.com/support/kb/doc/?id=000021048" source="SUSE-SU"/>
    <description>
    A buffer overflow was found in grub_font_construct_glyph(). A malicious crafted pf2 font can lead to an overflow when calculating the max_glyph_size value, allocating a smaller than needed buffer for the glyph, this further leads to a buffer overflow and a heap based out-of-bounds write. An attacker may use this vulnerability to circumvent the secure boot mechanism.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-26"/>
	<updated date="2023-04-21"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2601/">CVE-2022-2601</cve>
	<bugzilla href="https://bugzilla.suse.com/1205178">SUSE bug 1205178</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009726393" comment="grub2-2.04-150300.22.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153175" comment="grub2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009726212" comment="grub2-arm64-efi-2.04-150300.22.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623763" comment="grub2-arm64-efi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009726213" comment="grub2-i386-pc-2.04-150300.22.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153178" comment="grub2-i386-pc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009726216" comment="grub2-snapper-plugin-2.04-150300.22.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153179" comment="grub2-snapper-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009726218" comment="grub2-x86_64-efi-2.04-150300.22.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153180" comment="grub2-x86_64-efi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009726221" comment="grub2-x86_64-xen-2.04-150300.22.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153181" comment="grub2-x86_64-xen is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2602</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2602" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2602" ref_url="https://www.suse.com/security/cve/CVE-2022-2602" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013718.html" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-12-24"/>
	<updated date="2023-03-18"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2602/">CVE-2022-2602</cve>
	<bugzilla href="https://bugzilla.suse.com/1204228">SUSE bug 1204228</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205186">SUSE bug 1205186</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009729181" comment="kernel-default-5.3.18-150300.59.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009729182" comment="kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009729347" comment="kernel-rt-5.3.18-150300.112.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202226362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-26362</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-26362" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-26362" ref_url="https://www.suse.com/security/cve/CVE-2022-26362" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011717.html" source="SUSE-SU"/>
    <description>
    x86 pv: Race condition in typeref acquisition Xen maintains a type reference count for pages, in addition to a regular reference count. This scheme is used to maintain invariants required for Xen's safety, e.g. PV guests may not have direct writeable access to pagetables; updates need auditing by Xen. Unfortunately, the logic for acquiring a type reference has a race condition, whereby a safely TLB flush is issued too early and creates a window where the guest can re-establish the read/write mapping before writeability is prohibited.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2023-01-17"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26362/">CVE-2022-26362</cve>
	<bugzilla href="https://bugzilla.suse.com/1199965">SUSE bug 1199965</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009702471" comment="xen-libs-4.14.5_04-150300.3.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202226363" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-26363</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-26363" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-26363" ref_url="https://www.suse.com/security/cve/CVE-2022-26363" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011717.html" source="SUSE-SU"/>
    <description>
    x86 pv: Insufficient care with non-coherent mappings T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Xen maintains a type reference count for pages, in addition to a regular reference count. This scheme is used to maintain invariants required for Xen's safety, e.g. PV guests may not have direct writeable access to pagetables; updates need auditing by Xen. Unfortunately, Xen's safety logic doesn't account for CPU-induced cache non-coherency; cases where the CPU can cause the content of the cache to be different to the content in main memory. In such cases, Xen's safety logic can incorrectly conclude that the contents of a page is safe.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2022-09-02"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26363/">CVE-2022-26363</cve>
	<bugzilla href="https://bugzilla.suse.com/1199966">SUSE bug 1199966</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009702471" comment="xen-libs-4.14.5_04-150300.3.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202226364" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-26364</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-26364" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-26364" ref_url="https://www.suse.com/security/cve/CVE-2022-26364" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011717.html" source="SUSE-SU"/>
    <description>
    x86 pv: Insufficient care with non-coherent mappings T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Xen maintains a type reference count for pages, in addition to a regular reference count. This scheme is used to maintain invariants required for Xen's safety, e.g. PV guests may not have direct writeable access to pagetables; updates need auditing by Xen. Unfortunately, Xen's safety logic doesn't account for CPU-induced cache non-coherency; cases where the CPU can cause the content of the cache to be different to the content in main memory. In such cases, Xen's safety logic can incorrectly conclude that the contents of a page is safe.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2022-09-02"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26364/">CVE-2022-26364</cve>
	<bugzilla href="https://bugzilla.suse.com/1199966">SUSE bug 1199966</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009702471" comment="xen-libs-4.14.5_04-150300.3.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202226365" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-26365</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-26365" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26365" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-26365" ref_url="https://www.suse.com/security/cve/CVE-2022-26365" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2875-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2892-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012866.html" source="SUSE-SU"/>
    <description>
    Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don't zero memory regions before sharing them with the backend (CVE-2022-26365, CVE-2022-33740). Additionally the granularity of the grant table doesn't allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend (CVE-2022-33741, CVE-2022-33742).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-24"/>
	<updated date="2022-11-13"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-26365/">CVE-2022-26365</cve>
	<bugzilla href="https://bugzilla.suse.com/1200762">SUSE bug 1200762</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009706514" comment="kernel-default-5.3.18-150300.59.90.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009706515" comment="kernel-default-base-5.3.18-150300.59.90.1.150300.18.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009707566" comment="kernel-rt-5.3.18-150300.99.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009718861" comment="xen-libs-4.14.5_06-150300.3.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202226373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-26373</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-26373" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-26373" ref_url="https://www.suse.com/security/cve/CVE-2022-26373" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/025152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    Non-transparent sharing of return predictor targets between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-15"/>
	<updated date="2023-03-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-26373/">CVE-2022-26373</cve>
	<bugzilla href="https://bugzilla.suse.com/1201726">SUSE bug 1201726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209619">SUSE bug 1209619</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009711223" comment="kernel-default-5.3.18-150300.59.93.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009711224" comment="kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721582" comment="kernel-rt-5.3.18-150300.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2639</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2639" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2639" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2639" ref_url="https://www.suse.com/security/cve/CVE-2022-2639" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2875-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2892-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/025152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    An integer coercion error was found in the openvswitch kernel module. Given a sufficiently large number of actions, while copying and reserving memory for a new action of a new flow, the reserve_sfa_size() function does not return -EMSGSIZE as expected, potentially leading to an out-of-bounds write access. This flaw allows a local user to crash or potentially escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-24"/>
	<updated date="2022-12-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-2639/">CVE-2022-2639</cve>
	<bugzilla href="https://bugzilla.suse.com/1202154">SUSE bug 1202154</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009706514" comment="kernel-default-5.3.18-150300.59.90.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009706515" comment="kernel-default-base-5.3.18-150300.59.90.1.150300.18.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009707566" comment="kernel-rt-5.3.18-150300.99.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2663</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2663" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2663" ref_url="https://www.suse.com/security/cve/CVE-2022-2663" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
    <description>
    An issue was found in the Linux kernel in nf_conntrack_irc where the message handling can be confused and incorrectly matches the message. A firewall may be able to be bypassed when users are using unencrypted IRC with nf_conntrack_irc configured.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-15"/>
	<updated date="2023-06-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-2663/">CVE-2022-2663</cve>
	<bugzilla href="https://bugzilla.suse.com/1202097">SUSE bug 1202097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212299">SUSE bug 1212299</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009711223" comment="kernel-default-5.3.18-150300.59.93.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009711224" comment="kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721582" comment="kernel-rt-5.3.18-150300.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202227191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-27191</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-27191" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27191" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-27191" ref_url="https://www.suse.com/security/cve/CVE-2022-27191" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2839-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4409-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013228.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2579-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029950.html" source="SUSE-SU"/>
    <description>
    The golang.org/x/crypto/ssh package before 0.0.0-20220314234659-1baeb1ce4c0b for Go allows an attacker to crash a server in certain circumstances involving AddHostKey.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-20"/>
	<updated date="2023-06-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27191/">CVE-2022-27191</cve>
	<bugzilla href="https://bugzilla.suse.com/1197284">SUSE bug 1197284</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009728138" comment="containerd-1.6.12-150000.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153864" comment="containerd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705816" comment="podman-3.4.7-150300.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266791" comment="podman is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705632" comment="podman-cni-config-3.4.7-150300.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266792" comment="podman-cni-config is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202227404" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-27404</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-27404" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27404" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-27404" ref_url="https://www.suse.com/security/cve/CVE-2022-27404" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/025092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3252-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012330.html" source="SUSE-SU"/>
    <description>
    FreeType commit 1e2eb65048f75c64b68708efed6ce904c31f3b2f was discovered to contain a heap buffer overflow via the function sfnt_init_face.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-13"/>
	<updated date="2023-02-10"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27404/">CVE-2022-27404</cve>
	<bugzilla href="https://bugzilla.suse.com/1198830">SUSE bug 1198830</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009708370" comment="libfreetype6-2.10.4-150000.4.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151248" comment="libfreetype6 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202227405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-27405</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-27405" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27405" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-27405" ref_url="https://www.suse.com/security/cve/CVE-2022-27405" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/025092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3252-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012330.html" source="SUSE-SU"/>
    <description>
    FreeType commit 53dfdcd8198d2b3201a23c4bad9190519ba918db was discovered to contain a segmentation violation via the function FNT_Size_Request.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-13"/>
	<updated date="2023-02-10"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27405/">CVE-2022-27405</cve>
	<bugzilla href="https://bugzilla.suse.com/1198832">SUSE bug 1198832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009708370" comment="libfreetype6-2.10.4-150000.4.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151248" comment="libfreetype6 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202227406" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-27406</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-27406" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27406" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-27406" ref_url="https://www.suse.com/security/cve/CVE-2022-27406" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/025092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3252-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012330.html" source="SUSE-SU"/>
    <description>
    FreeType commit 22a0cccb4d9d002f33c1ba7a4b36812c7d4f46b5 was discovered to contain a segmentation violation via the function FT_Request_Size.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-13"/>
	<updated date="2023-02-10"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27406/">CVE-2022-27406</cve>
	<bugzilla href="https://bugzilla.suse.com/1198823">SUSE bug 1198823</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009708370" comment="libfreetype6-2.10.4-150000.4.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151248" comment="libfreetype6 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202227649" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-27649</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-27649" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27649" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-27649" ref_url="https://www.suse.com/security/cve/CVE-2022-27649" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013710.html" source="SUSE-SU"/>
    <description>
    A flaw was found in Podman, where containers were started incorrectly with non-empty default permissions. A vulnerability was found in Moby (Docker Engine), where containers were started incorrectly with non-empty inheritable Linux process capabilities. This flaw allows an attacker with access to programs with inheritable file capabilities to elevate those capabilities to the permitted set when execve(2) runs.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-10"/>
	<updated date="2023-02-10"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-27649/">CVE-2022-27649</cve>
	<bugzilla href="https://bugzilla.suse.com/1197909">SUSE bug 1197909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009730379" comment="podman-4.3.1-150300.9.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266791" comment="podman is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009730380" comment="podman-cni-config-4.3.1-150300.9.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266792" comment="podman-cni-config is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2816</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2816" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2816" ref_url="https://www.suse.com/security/cve/CVE-2022-2816" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.0212.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-10"/>
	<updated date="2022-12-28"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2816/">CVE-2022-2816</cve>
	<bugzilla href="https://bugzilla.suse.com/1202421">SUSE bug 1202421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203576">SUSE bug 1203576</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709663" comment="vim-data-common-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709823" comment="vim-small-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2817</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2817" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2817" ref_url="https://www.suse.com/security/cve/CVE-2022-2817" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    Use After Free in GitHub repository vim/vim prior to 9.0.0213.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-10"/>
	<updated date="2022-12-28"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2817/">CVE-2022-2817</cve>
	<bugzilla href="https://bugzilla.suse.com/1202420">SUSE bug 1202420</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709663" comment="vim-data-common-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709823" comment="vim-small-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2819</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2819" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2819" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2819" ref_url="https://www.suse.com/security/cve/CVE-2022-2819" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0211.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-10"/>
	<updated date="2022-12-28"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2819/">CVE-2022-2819</cve>
	<bugzilla href="https://bugzilla.suse.com/1202414">SUSE bug 1202414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203576">SUSE bug 1203576</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709663" comment="vim-data-common-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709823" comment="vim-small-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2845</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2845" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2845" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2845" ref_url="https://www.suse.com/security/cve/CVE-2022-2845" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    Improper Validation of Specified Quantity in Input in GitHub repository vim/vim prior to 9.0.0218.


    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-10"/>
	<updated date="2023-07-11"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2845/">CVE-2022-2845</cve>
	<bugzilla href="https://bugzilla.suse.com/1202515">SUSE bug 1202515</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709663" comment="vim-data-common-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709823" comment="vim-small-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222849" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2849</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2849" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2849" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2849" ref_url="https://www.suse.com/security/cve/CVE-2022-2849" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0220.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-10"/>
	<updated date="2022-12-28"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2849/">CVE-2022-2849</cve>
	<bugzilla href="https://bugzilla.suse.com/1202512">SUSE bug 1202512</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709663" comment="vim-data-common-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709823" comment="vim-small-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2862</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2862" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2862" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2862" ref_url="https://www.suse.com/security/cve/CVE-2022-2862" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    Use After Free in GitHub repository vim/vim prior to 9.0.0221.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-10"/>
	<updated date="2022-12-28"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-2862/">CVE-2022-2862</cve>
	<bugzilla href="https://bugzilla.suse.com/1202511">SUSE bug 1202511</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709663" comment="vim-data-common-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709823" comment="vim-small-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2867</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2867" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2867" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2867" ref_url="https://www.suse.com/security/cve/CVE-2022-2867" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012599.html" source="SUSE-SU"/>
    <description>
    libtiff's tiffcrop utility has a uint32_t underflow that can lead to out of bounds read and write. An attacker who supplies a crafted file to tiffcrop (likely via tricking a user to run tiffcrop on it with certain parameters) could cause a crash or in some cases, further exploitation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-22"/>
	<updated date="2023-02-10"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2867/">CVE-2022-2867</cve>
	<bugzilla href="https://bugzilla.suse.com/1202466">SUSE bug 1202466</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009718763" comment="libtiff5-4.0.9-150000.45.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2868</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2868" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2868" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2868" ref_url="https://www.suse.com/security/cve/CVE-2022-2868" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012599.html" source="SUSE-SU"/>
    <description>
    libtiff's tiffcrop utility has a improper input validation flaw that can lead to out of bounds read and ultimately cause a crash if an attacker is able to supply a crafted file to tiffcrop.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-22"/>
	<updated date="2023-02-10"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2868/">CVE-2022-2868</cve>
	<bugzilla href="https://bugzilla.suse.com/1202467">SUSE bug 1202467</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009718763" comment="libtiff5-4.0.9-150000.45.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222869" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2869</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2869" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2869" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2869" ref_url="https://www.suse.com/security/cve/CVE-2022-2869" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012599.html" source="SUSE-SU"/>
    <description>
    libtiff's tiffcrop tool has a uint32_t underflow which leads to out of bounds read and write in the extractContigSamples8bits routine. An attacker who supplies a crafted file to tiffcrop could trigger this flaw, most likely by tricking a user into opening the crafted file with tiffcrop. Triggering this flaw could cause a crash or potentially further exploitation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-22"/>
	<updated date="2023-02-10"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2869/">CVE-2022-2869</cve>
	<bugzilla href="https://bugzilla.suse.com/1202468">SUSE bug 1202468</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009718763" comment="libtiff5-4.0.9-150000.45.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202228693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-28693</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-28693" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28693" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-28693" ref_url="https://www.suse.com/security/cve/CVE-2022-28693" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="TID000020693" ref_url="https://www.suse.com/support/kb/doc/?id=000020693" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-12-24"/>
	<updated date="2023-03-18"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28693/">CVE-2022-28693</cve>
	<bugzilla href="https://bugzilla.suse.com/1201455">SUSE bug 1201455</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009729181" comment="kernel-default-5.3.18-150300.59.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009729182" comment="kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009729347" comment="kernel-rt-5.3.18-150300.112.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202228737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-28737</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-28737" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28737" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-28737" ref_url="https://www.suse.com/security/cve/CVE-2022-28737" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1702-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2150-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029298.html" source="SUSE-SU"/>
		<reference ref_id="TID000020668" ref_url="https://www.suse.com/support/kb/doc/?id=000020668" source="SUSE-SU"/>
    <description>
    There's a possible overflow in handle_image() when shim tries to load and execute crafted EFI executables; The handle_image() function takes into account the SizeOfRawData field from each section to be loaded. An attacker can leverage this to perform out-of-bound writes into memory. Arbitrary code execution is not discarded in such scenario.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-31"/>
	<updated date="2023-07-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28737/">CVE-2022-28737</cve>
	<bugzilla href="https://bugzilla.suse.com/1198458">SUSE bug 1198458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205065">SUSE bug 1205065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205066">SUSE bug 1205066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205831">SUSE bug 1205831</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009755034" comment="shim-15.7-150300.4.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152144" comment="shim is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222874" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2874</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2874" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2874" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2874" ref_url="https://www.suse.com/security/cve/CVE-2022-2874" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0224.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-10"/>
	<updated date="2022-12-28"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2874/">CVE-2022-2874</cve>
	<bugzilla href="https://bugzilla.suse.com/1202552">SUSE bug 1202552</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709663" comment="vim-data-common-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709823" comment="vim-small-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202228748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-28748</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-28748" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28748" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-28748" ref_url="https://www.suse.com/security/cve/CVE-2022-28748" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4273-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/026621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-2964. Reason: This candidate is a reservation duplicate of CVE-2022-2964. Notes: All CVE users should reference CVE-2022-2964 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-13"/>
	<updated date="2022-12-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28748/">CVE-2022-28748</cve>
	<bugzilla href="https://bugzilla.suse.com/1196018">SUSE bug 1196018</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724435" comment="kernel-rt-5.3.18-150300.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222889" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2889</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2889" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2889" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2889" ref_url="https://www.suse.com/security/cve/CVE-2022-2889" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    Use After Free in GitHub repository vim/vim prior to 9.0.0225.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-10"/>
	<updated date="2022-12-28"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2889/">CVE-2022-2889</cve>
	<bugzilla href="https://bugzilla.suse.com/1202599">SUSE bug 1202599</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709663" comment="vim-data-common-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709823" comment="vim-small-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2905</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2905" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2905" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2905" ref_url="https://www.suse.com/security/cve/CVE-2022-2905" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds memory read flaw was found in the Linux kernel's BPF subsystem in how a user calls the bpf_tail_call function with a key larger than the max_entries of the map. This flaw allows a local user to gain unauthorized access to data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-15"/>
	<updated date="2022-12-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-2905/">CVE-2022-2905</cve>
	<bugzilla href="https://bugzilla.suse.com/1202860">SUSE bug 1202860</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009711223" comment="kernel-default-5.3.18-150300.59.93.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009711224" comment="kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721582" comment="kernel-rt-5.3.18-150300.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202229154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-29154</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-29154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29154" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-29154" ref_url="https://www.suse.com/security/cve/CVE-2022-29154" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2959-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/012015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2959-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012056.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in rsync before 3.2.5 that allows malicious remote servers to write arbitrary files inside the directories of connecting peers. The server chooses which files/directories are sent to the client. However, the rsync client performs insufficient validation of file names. A malicious rsync server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the rsync client target directory and subdirectories (for example, overwrite the .ssh/authorized_keys file).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-01"/>
	<updated date="2022-11-05"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29154/">CVE-2022-29154</cve>
	<bugzilla href="https://bugzilla.suse.com/1201840">SUSE bug 1201840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202970">SUSE bug 1202970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202998">SUSE bug 1202998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203401">SUSE bug 1203401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203789">SUSE bug 1203789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204119">SUSE bug 1204119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205072">SUSE bug 1205072</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009706912" comment="rsync-3.1.3-150000.4.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151567" comment="rsync is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222923" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2923</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2923" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2923" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2923" ref_url="https://www.suse.com/security/cve/CVE-2022-2923" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0240.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-10"/>
	<updated date="2022-12-28"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2923/">CVE-2022-2923</cve>
	<bugzilla href="https://bugzilla.suse.com/1202687">SUSE bug 1202687</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709663" comment="vim-data-common-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709823" comment="vim-small-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202229458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-29458</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-29458" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-29458" ref_url="https://www.suse.com/security/cve/CVE-2022-29458" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2717-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-August/024348.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2717-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011831.html" source="SUSE-SU"/>
    <description>
    ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-10"/>
	<updated date="2023-04-29"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-29458/">CVE-2022-29458</cve>
	<bugzilla href="https://bugzilla.suse.com/1198627">SUSE bug 1198627</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705481" comment="libncurses6-6.1-150000.5.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158858" comment="libncurses6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705482" comment="ncurses-utils-6.1-150000.5.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158863" comment="ncurses-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705483" comment="terminfo-6.1-150000.5.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158865" comment="terminfo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705484" comment="terminfo-base-6.1-150000.5.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158866" comment="terminfo-base is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222946" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2946</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2946" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2946" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2946" ref_url="https://www.suse.com/security/cve/CVE-2022-2946" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    Use After Free in GitHub repository vim/vim prior to 9.0.0246.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-10"/>
	<updated date="2022-12-28"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-2946/">CVE-2022-2946</cve>
	<bugzilla href="https://bugzilla.suse.com/1202689">SUSE bug 1202689</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709663" comment="vim-data-common-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709823" comment="vim-small-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202229581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-29581</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-29581" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-29581" ref_url="https://www.suse.com/security/cve/CVE-2022-29581" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2875-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2892-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/025152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3432-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012463.html" source="SUSE-SU"/>
    <description>
    Improper Update of Reference Count vulnerability in net/sched of Linux Kernel allows local attacker to cause privilege escalation to root. This issue affects: Linux Kernel versions prior to 5.18; version 4.14 and later versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-24"/>
	<updated date="2022-11-13"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29581/">CVE-2022-29581</cve>
	<bugzilla href="https://bugzilla.suse.com/1199665">SUSE bug 1199665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199695">SUSE bug 1199695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205313">SUSE bug 1205313</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009706514" comment="kernel-default-5.3.18-150300.59.90.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009706515" comment="kernel-default-base-5.3.18-150300.59.90.1.150300.18.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009707566" comment="kernel-rt-5.3.18-150300.99.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2964</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2964" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2964" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2964" ref_url="https://www.suse.com/security/cve/CVE-2022-2964" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4273-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/026621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel’s driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices. The vulnerability contains multiple out-of-bounds reads and possible out-of-bounds writes.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-13"/>
	<updated date="2023-02-10"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2964/">CVE-2022-2964</cve>
	<bugzilla href="https://bugzilla.suse.com/1202686">SUSE bug 1202686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203008">SUSE bug 1203008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208044">SUSE bug 1208044</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724521" comment="kernel-default-5.3.18-150300.59.101.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724522" comment="kernel-default-base-5.3.18-150300.59.101.1.150300.18.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724435" comment="kernel-rt-5.3.18-150300.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2977</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2977" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2977" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2977" ref_url="https://www.suse.com/security/cve/CVE-2022-2977" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/025152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel implementation of proxied virtualized TPM devices. On a system where virtualized TPM devices are configured (this is not the default) a local attacker can create a use-after-free and create a situation where it may be possible to escalate privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-15"/>
	<updated date="2022-12-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2977/">CVE-2022-2977</cve>
	<bugzilla href="https://bugzilla.suse.com/1202672">SUSE bug 1202672</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009711223" comment="kernel-default-5.3.18-150300.59.93.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009711224" comment="kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721582" comment="kernel-rt-5.3.18-150300.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2978</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2978" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2978" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2978" ref_url="https://www.suse.com/security/cve/CVE-2022-2978" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    A flaw use after free in the Linux kernel NILFS file system was found in the way user triggers function security_inode_alloc to fail with following call to function nilfs_mdt_destroy. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-13"/>
	<updated date="2022-12-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2978/">CVE-2022-2978</cve>
	<bugzilla href="https://bugzilla.suse.com/1202700">SUSE bug 1202700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204745">SUSE bug 1204745</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724521" comment="kernel-default-5.3.18-150300.59.101.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724522" comment="kernel-default-base-5.3.18-150300.59.101.1.150300.18.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724435" comment="kernel-rt-5.3.18-150300.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222980" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2980</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2980" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2980" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2980" ref_url="https://www.suse.com/security/cve/CVE-2022-2980" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:3228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0259.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-30"/>
	<updated date="2023-03-02"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2980/">CVE-2022-2980</cve>
	<bugzilla href="https://bugzilla.suse.com/1203155">SUSE bug 1203155</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009726770" comment="vim-data-common-9.0.0814-150000.5.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009726850" comment="vim-small-9.0.0814-150000.5.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2982</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2982" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2982" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2982" ref_url="https://www.suse.com/security/cve/CVE-2022-2982" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:3228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    Use After Free in GitHub repository vim/vim prior to 9.0.0260.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-30"/>
	<updated date="2023-03-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2982/">CVE-2022-2982</cve>
	<bugzilla href="https://bugzilla.suse.com/1203152">SUSE bug 1203152</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009726770" comment="vim-data-common-9.0.0814-150000.5.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009726850" comment="vim-small-9.0.0814-150000.5.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202229824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-29824</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-29824" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29824" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-29824" ref_url="https://www.suse.com/security/cve/CVE-2022-29824" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1111-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-May/023264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011108.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1654-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1666-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1691-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014596.html" source="SUSE-SU"/>
    <description>
    In libxml2 before 2.9.14, several buffer handling functions in buf.c (xmlBuf*) and tree.c (xmlBuffer*) don't check for integer overflows. This can result in out-of-bounds memory writes. Exploitation requires a victim to open a crafted, multi-gigabyte XML file. Other software using libxml2's buffer functions, for example libxslt through 1.1.35, is affected as well.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-04-27"/>
	<updated date="2023-06-16"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29824/">CVE-2022-29824</cve>
	<bugzilla href="https://bugzilla.suse.com/1199132">SUSE bug 1199132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202878">SUSE bug 1202878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204121">SUSE bug 1204121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204131">SUSE bug 1204131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205069">SUSE bug 1205069</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009755256" comment="libxml2-2-2.9.7-150000.3.57.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151137" comment="libxml2-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009755259" comment="libxml2-tools-2.9.7-150000.3.57.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151140" comment="libxml2-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009755260" comment="python3-libxml2-python-2.9.7-150000.3.57.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177126" comment="python3-libxml2-python is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202229869" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-29869</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-29869" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29869" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-29869" ref_url="https://www.suse.com/security/cve/CVE-2022-29869" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012498.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2801-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/744TDSJVWGHR6LCEL64KSZ6F4ZOIZJQP/" source="SUSE-SU"/>
    <description>
    cifs-utils through 6.14, with verbose logging, can cause an information leak when a file contains = (equal sign) characters but is not a valid credentials file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-13"/>
	<updated date="2022-10-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-29869/">CVE-2022-29869</cve>
	<bugzilla href="https://bugzilla.suse.com/1198976">SUSE bug 1198976</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705480" comment="cifs-utils-6.9-150100.5.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151261" comment="cifs-utils is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2989</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2989" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2989" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2989" ref_url="https://www.suse.com/security/cve/CVE-2022-2989" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013710.html" source="SUSE-SU"/>
    <description>
    An incorrect handling of the supplementary groups in the Podman container engine might lead to the sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code in that container.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-01"/>
	<updated date="2023-02-10"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-2989/">CVE-2022-2989</cve>
	<bugzilla href="https://bugzilla.suse.com/1202809">SUSE bug 1202809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009730379" comment="podman-4.3.1-150300.9.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266791" comment="podman is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009730380" comment="podman-cni-config-4.3.1-150300.9.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266792" comment="podman-cni-config is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2990</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2990" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2990" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2990" ref_url="https://www.suse.com/security/cve/CVE-2022-2990" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2741-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-October/025850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013201.html" source="SUSE-SU"/>
    <description>
    An incorrect handling of the supplementary groups in the Buildah container engine might lead to the sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code in that container.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-27"/>
	<updated date="2023-04-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-2990/">CVE-2022-2990</cve>
	<bugzilla href="https://bugzilla.suse.com/1202812">SUSE bug 1202812</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009717628" comment="libgpg-error0-1.42-150300.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009721857" comment="libgpg-error0 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202229900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-29900</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-29900" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-29900" ref_url="https://www.suse.com/security/cve/CVE-2022-29900" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2424-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
		<reference ref_id="TID000020693" ref_url="https://www.suse.com/support/kb/doc/?id=000020693" source="SUSE-SU"/>
		<reference ref_id="TID000021148" ref_url="https://www.suse.com/support/kb/doc/?id=000021148" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2422-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UCV6OZAODHO3XSCOPNA6KBP5EOWSRH4L/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2549-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YODNNJY6VGTGGVMUQLFLWV5FFYHIFW3C/" source="SUSE-SU"/>
    <description>
    Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2023-07-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-29900/">CVE-2022-29900</cve>
	<bugzilla href="https://bugzilla.suse.com/1199657">SUSE bug 1199657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201469">SUSE bug 1201469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207894">SUSE bug 1207894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009729181" comment="kernel-default-5.3.18-150300.59.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009729182" comment="kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009698643" comment="kernel-rt-5.3.18-150300.96.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009702471" comment="xen-libs-4.14.5_04-150300.3.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202229901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-29901</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-29901" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-29901" ref_url="https://www.suse.com/security/cve/CVE-2022-29901" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2424-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
		<reference ref_id="TID000020693" ref_url="https://www.suse.com/support/kb/doc/?id=000020693" source="SUSE-SU"/>
		<reference ref_id="TID000021148" ref_url="https://www.suse.com/support/kb/doc/?id=000021148" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2422-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UCV6OZAODHO3XSCOPNA6KBP5EOWSRH4L/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2549-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YODNNJY6VGTGGVMUQLFLWV5FFYHIFW3C/" source="SUSE-SU"/>
    <description>
    Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2023-07-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-29901/">CVE-2022-29901</cve>
	<bugzilla href="https://bugzilla.suse.com/1201469">SUSE bug 1201469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207894">SUSE bug 1207894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009729181" comment="kernel-default-5.3.18-150300.59.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009729182" comment="kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009698643" comment="kernel-rt-5.3.18-150300.96.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3016</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3016" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3016" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3016" ref_url="https://www.suse.com/security/cve/CVE-2022-3016" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    Use After Free in GitHub repository vim/vim prior to 9.0.0286.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-10"/>
	<updated date="2022-12-28"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3016/">CVE-2022-3016</cve>
	<bugzilla href="https://bugzilla.suse.com/1202862">SUSE bug 1202862</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709663" comment="vim-data-common-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709823" comment="vim-small-9.0.0313-150000.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3028</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3028" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3028" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3028" ref_url="https://www.suse.com/security/cve/CVE-2022-3028" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/025152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
    <description>
    A race condition was found in the Linux kernel's IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously. This flaw could allow a local attacker to potentially trigger an out-of-bounds write or leak kernel heap memory by performing an out-of-bounds read and copying it into a socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-15"/>
	<updated date="2023-06-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3028/">CVE-2022-3028</cve>
	<bugzilla href="https://bugzilla.suse.com/1202898">SUSE bug 1202898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212296">SUSE bug 1212296</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009711223" comment="kernel-default-5.3.18-150300.59.93.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009711224" comment="kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721582" comment="kernel-rt-5.3.18-150300.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223037" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3037</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3037" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3037" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3037" ref_url="https://www.suse.com/security/cve/CVE-2022-3037" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:3228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    Use After Free in GitHub repository vim/vim prior to 9.0.0322.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-30"/>
	<updated date="2023-03-02"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3037/">CVE-2022-3037</cve>
	<bugzilla href="https://bugzilla.suse.com/1202962">SUSE bug 1202962</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009726770" comment="vim-data-common-9.0.0814-150000.5.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009726850" comment="vim-small-9.0.0814-150000.5.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202230594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-30594</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-30594" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-30594" ref_url="https://www.suse.com/security/cve/CVE-2022-30594" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1974-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011744.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S2QMD6CJ6PZDFYQ3RKSOGAZNRK7WC5W7/" source="SUSE-SU"/>
    <description>
    The Linux kernel before 5.17.2 mishandles seccomp permissions. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2022-12-02"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30594/">CVE-2022-30594</cve>
	<bugzilla href="https://bugzilla.suse.com/1199505">SUSE bug 1199505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199602">SUSE bug 1199602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201549">SUSE bug 1201549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204132">SUSE bug 1204132</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009684736" comment="kernel-rt-5.3.18-150300.93.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3099</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3099" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3099" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3099" ref_url="https://www.suse.com/security/cve/CVE-2022-3099" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:3228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    Use After Free in GitHub repository vim/vim prior to 9.0.0360.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-30"/>
	<updated date="2023-03-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-3099/">CVE-2022-3099</cve>
	<bugzilla href="https://bugzilla.suse.com/1203110">SUSE bug 1203110</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009726770" comment="vim-data-common-9.0.0814-150000.5.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009726850" comment="vim-small-9.0.0814-150000.5.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3105</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3105" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3105" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3105" ref_url="https://www.suse.com/security/cve/CVE-2022-3105" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013757.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.16-rc6. uapi_finalize in drivers/infiniband/core/uverbs_uapi.c lacks check of kmalloc_array().
    </description>
<advisory from="security@suse.de">
	<issued date="2023-01-26"/>
	<updated date="2023-03-18"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3105/">CVE-2022-3105</cve>
	<bugzilla href="https://bugzilla.suse.com/1206398">SUSE bug 1206398</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009735606" comment="kernel-default-5.3.18-150300.59.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009735607" comment="kernel-default-base-5.3.18-150300.59.109.1.150300.18.62.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009734769" comment="kernel-rt-5.3.18-150300.115.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3106</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3106" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3106" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3106" ref_url="https://www.suse.com/security/cve/CVE-2022-3106" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013530.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.16-rc6. ef100_update_stats in drivers/net/ethernet/sfc/ef100_nic.c lacks check of the return value of kmalloc().
    </description>
<advisory from="security@suse.de">
	<issued date="2023-01-26"/>
	<updated date="2023-03-18"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3106/">CVE-2022-3106</cve>
	<bugzilla href="https://bugzilla.suse.com/1206397">SUSE bug 1206397</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009735606" comment="kernel-default-5.3.18-150300.59.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009735607" comment="kernel-default-base-5.3.18-150300.59.109.1.150300.18.62.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009734769" comment="kernel-rt-5.3.18-150300.115.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3107</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3107" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3107" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3107" ref_url="https://www.suse.com/security/cve/CVE-2022-3107" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013976.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.16-rc6. netvsc_get_ethtool_stats in drivers/net/hyperv/netvsc_drv.c lacks check of the return value of kvmalloc_array() and will cause the null pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-01-26"/>
	<updated date="2023-03-18"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3107/">CVE-2022-3107</cve>
	<bugzilla href="https://bugzilla.suse.com/1206395">SUSE bug 1206395</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009735606" comment="kernel-default-5.3.18-150300.59.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009735607" comment="kernel-default-base-5.3.18-150300.59.109.1.150300.18.62.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009734769" comment="kernel-rt-5.3.18-150300.115.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3108</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3108" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3108" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3108" ref_url="https://www.suse.com/security/cve/CVE-2022-3108" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013976.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.16-rc6. kfd_parse_subtype_iolink in drivers/gpu/drm/amd/amdkfd/kfd_crat.c lacks check of the return value of kmemdup().
    </description>
<advisory from="security@suse.de">
	<issued date="2023-01-26"/>
	<updated date="2023-03-18"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3108/">CVE-2022-3108</cve>
	<bugzilla href="https://bugzilla.suse.com/1206389">SUSE bug 1206389</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009735606" comment="kernel-default-5.3.18-150300.59.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009735607" comment="kernel-default-base-5.3.18-150300.59.109.1.150300.18.62.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009734769" comment="kernel-rt-5.3.18-150300.115.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3111</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3111" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3111" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3111" ref_url="https://www.suse.com/security/cve/CVE-2022-3111" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013530.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.16-rc6. free_charger_irq() in drivers/power/supply/wm8350_power.c lacks free of WM8350_IRQ_CHG_FAST_RDY, which is registered in wm8350_init_charger().
    </description>
<advisory from="security@suse.de">
	<issued date="2023-01-26"/>
	<updated date="2023-03-18"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3111/">CVE-2022-3111</cve>
	<bugzilla href="https://bugzilla.suse.com/1206394">SUSE bug 1206394</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009735606" comment="kernel-default-5.3.18-150300.59.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009735607" comment="kernel-default-base-5.3.18-150300.59.109.1.150300.18.62.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009734769" comment="kernel-rt-5.3.18-150300.115.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3112</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3112" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3112" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3112" ref_url="https://www.suse.com/security/cve/CVE-2022-3112" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013959.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.16-rc6. amvdec_set_canvases in drivers/staging/media/meson/vdec/vdec_helpers.c lacks check of the return value of kzalloc() and will cause the null pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-01-26"/>
	<updated date="2023-03-18"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3112/">CVE-2022-3112</cve>
	<bugzilla href="https://bugzilla.suse.com/1206399">SUSE bug 1206399</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009735606" comment="kernel-default-5.3.18-150300.59.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009735607" comment="kernel-default-base-5.3.18-150300.59.109.1.150300.18.62.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009742406" comment="kernel-rt-5.3.18-150300.118.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3115</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3115" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3115" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3115" ref_url="https://www.suse.com/security/cve/CVE-2022-3115" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013959.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.16-rc6. malidp_crtc_reset in drivers/gpu/drm/arm/malidp_crtc.c lacks check of the return value of kzalloc() and will cause the null pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-01-26"/>
	<updated date="2023-03-18"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3115/">CVE-2022-3115</cve>
	<bugzilla href="https://bugzilla.suse.com/1206393">SUSE bug 1206393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009735606" comment="kernel-default-5.3.18-150300.59.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009735607" comment="kernel-default-base-5.3.18-150300.59.109.1.150300.18.62.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009742406" comment="kernel-rt-5.3.18-150300.118.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202231252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-31252</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-31252" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31252" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-31252" ref_url="https://www.suse.com/security/cve/CVE-2022-31252" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012412.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012421.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2666-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012380.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:10128-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NO6AGAAYGBGTUQMTU4PWGSPL2DHABXTM/" source="SUSE-SU"/>
    <description>
    A Incorrect Authorization vulnerability in chkstat of SUSE Linux Enterprise Server 12-SP5; openSUSE Leap 15.3, openSUSE Leap 15.4, openSUSE Leap Micro 5.2 did not consider group writable path components, allowing local attackers with access to a group what can write to a location included in the path to a privileged binary to influence path resolution. This issue affects: SUSE Linux Enterprise Server 12-SP5 permissions versions prior to 20170707. openSUSE Leap 15.3 permissions versions prior to 20200127. openSUSE Leap 15.4 permissions versions prior to 20201225. openSUSE Leap Micro 5.2 permissions versions prior to 20181225.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-27"/>
	<updated date="2023-04-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31252/">CVE-2022-31252</cve>
	<bugzilla href="https://bugzilla.suse.com/1203018">SUSE bug 1203018</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009714108" comment="permissions-20181225-150200.23.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009273426" comment="permissions is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3134</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3134" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3134" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3134" ref_url="https://www.suse.com/security/cve/CVE-2022-3134" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:3228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    Use After Free in GitHub repository vim/vim prior to 9.0.0389.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-30"/>
	<updated date="2023-03-02"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3134/">CVE-2022-3134</cve>
	<bugzilla href="https://bugzilla.suse.com/1203194">SUSE bug 1203194</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009726770" comment="vim-data-common-9.0.0814-150000.5.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009726850" comment="vim-small-9.0.0814-150000.5.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3153</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3153" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3153" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3153" ref_url="https://www.suse.com/security/cve/CVE-2022-3153" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:3228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0404.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-30"/>
	<updated date="2023-03-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3153/">CVE-2022-3153</cve>
	<bugzilla href="https://bugzilla.suse.com/1203272">SUSE bug 1203272</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009726770" comment="vim-data-common-9.0.0814-150000.5.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009726850" comment="vim-small-9.0.0814-150000.5.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202231676" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-31676</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-31676" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31676" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-31676" ref_url="https://www.suse.com/security/cve/CVE-2022-31676" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/012008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/012007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2936-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/012009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/012019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012049.html" source="SUSE-SU"/>
    <description>
    VMware Tools (12.0.0, 11.x.y and 10.x.y) contains a local privilege escalation vulnerability. A malicious actor with local non-administrative access to the Guest OS can escalate privileges as a root user in the virtual machine.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-30"/>
	<updated date="2022-11-17"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31676/">CVE-2022-31676</cve>
	<bugzilla href="https://bugzilla.suse.com/1202657">SUSE bug 1202657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202733">SUSE bug 1202733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202834">SUSE bug 1202834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202995">SUSE bug 1202995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204044">SUSE bug 1204044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205471">SUSE bug 1205471</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009707853" comment="libvmtools0-12.1.0-150300.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152857" comment="libvmtools0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009707854" comment="open-vm-tools-12.1.0-150300.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152858" comment="open-vm-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3169</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3169" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3169" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3169" ref_url="https://www.suse.com/security/cve/CVE-2022-3169" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4273-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/026621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel. A denial of service flaw may occur if there is a consecutive request of the NVME_IOCTL_RESET and the NVME_IOCTL_SUBSYS_RESET through the device file of the driver, resulting in a PCIe link disconnect.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-27"/>
	<updated date="2022-12-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3169/">CVE-2022-3169</cve>
	<bugzilla href="https://bugzilla.suse.com/1203290">SUSE bug 1203290</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721862" comment="kernel-default-5.3.18-150300.59.98.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721863" comment="kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721582" comment="kernel-rt-5.3.18-150300.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223171" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3171</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3171" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3171" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3171" ref_url="https://www.suse.com/security/cve/CVE-2022-3171" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2783-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016228.html" source="SUSE-SU"/>
    <description>
    A parsing issue with binary data in protobuf-java core and lite versions prior to 3.21.7, 3.20.3, 3.19.6 and 3.16.3 can lead to a denial of service attack. Inputs containing multiple instances of non-repeated embedded messages with repeated or unknown fields causes objects to be converted back-n-forth between mutable and immutable forms, resulting in potentially long garbage collection pauses. We recommend updating to the versions mentioned above.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-10"/>
	<updated date="2023-09-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3171/">CVE-2022-3171</cve>
	<bugzilla href="https://bugzilla.suse.com/1204256">SUSE bug 1204256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206544">SUSE bug 1206544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206545">SUSE bug 1206545</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721859" comment="libprotobuf-lite20-3.9.2-150200.4.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677903" comment="libprotobuf-lite20 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202231741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-31741</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-31741" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31741" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-31741" ref_url="https://www.suse.com/security/cve/CVE-2022-31741" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011644.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2533-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011716.html" source="SUSE-SU"/>
    <description>
    A crafted CMS message could have been processed incorrectly, leading to an invalid memory read, and potentially further memory corruption. This vulnerability affects Thunderbird &lt; 91.10, Firefox &lt; 101, and Firefox ESR &lt; 91.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2022-12-23"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31741/">CVE-2022-31741</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009699059" comment="libfreebl3-3.79-150000.3.74.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009699060" comment="libfreebl3-hmac-3.79-150000.3.74.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244408" comment="libfreebl3-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009699061" comment="libsoftokn3-3.79-150000.3.74.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009699062" comment="libsoftokn3-hmac-3.79-150000.3.74.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244410" comment="libsoftokn3-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009699063" comment="mozilla-nspr-4.34-150000.3.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009699065" comment="mozilla-nss-3.79-150000.3.74.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009699066" comment="mozilla-nss-certs-3.79-150000.3.74.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009699069" comment="mozilla-nss-tools-3.79-150000.3.74.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3176</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3176" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3176" ref_url="https://www.suse.com/security/cve/CVE-2022-3176" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    There exists a use-after-free in io_uring in the Linux kernel. Signalfd_poll() and binder_poll() use a waitqueue whose lifetime is the current task. It will send a POLLFREE notification to all waiters before the queue is freed. Unfortunately, the io_uring poll doesn't handle POLLFREE. This allows a use-after-free to occur if a signalfd or binder fd is polled with io_uring poll, and the waitqueue gets freed. We recommend upgrading past commit fc78b2fc21f10c4c9c4d5d659a685710ffa63659
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-13"/>
	<updated date="2023-01-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3176/">CVE-2022-3176</cve>
	<bugzilla href="https://bugzilla.suse.com/1203391">SUSE bug 1203391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203511">SUSE bug 1203511</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724521" comment="kernel-default-5.3.18-150300.59.101.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724522" comment="kernel-default-base-5.3.18-150300.59.101.1.150300.18.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724435" comment="kernel-rt-5.3.18-150300.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202232206" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-32206</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-32206" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-32206" ref_url="https://www.suse.com/security/cve/CVE-2022-32206" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1417-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2288-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-July/023784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2327-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011931.html" source="SUSE-SU"/>
    <description>
    curl &lt; 7.84.0 supports "chained" HTTP compression algorithms, meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable "links" in this "decompression chain" was unbounded, allowing a malicious server to insert a virtually unlimited number of compression steps.The use of such a decompression chain could result in a "malloc bomb", makingcurl end up spending enormous amounts of allocated heap memory, or trying toand returning out of memory errors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2023-04-29"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32206/">CVE-2022-32206</cve>
	<bugzilla href="https://bugzilla.suse.com/1200735">SUSE bug 1200735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207992">SUSE bug 1207992</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009699138" comment="curl-7.66.0-150200.4.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009699140" comment="libcurl4-7.66.0-150200.4.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202232208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-32208</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-32208" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-32208" ref_url="https://www.suse.com/security/cve/CVE-2022-32208" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1417-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2288-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-July/023784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2327-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011931.html" source="SUSE-SU"/>
    <description>
    When curl &lt; 7.84.0 does FTP transfers secured by krb5, it handles message verification failures wrongly. This flaw makes it possible for a Man-In-The-Middle attack to go unnoticed and even allows it to inject data to the client.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2023-04-29"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32208/">CVE-2022-32208</cve>
	<bugzilla href="https://bugzilla.suse.com/1200737">SUSE bug 1200737</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009699138" comment="curl-7.66.0-150200.4.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009699140" comment="libcurl4-7.66.0-150200.4.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202232221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-32221</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-32221" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32221" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-32221" ref_url="https://www.suse.com/security/cve/CVE-2022-32221" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2746-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012763.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2794-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/025905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2959-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012718.html" source="SUSE-SU"/>
    <description>
    When doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously was used to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the subsequent `POST` request. The problem exists in the logic for a reused handle when it is changed from a PUT to a POST.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-27"/>
	<updated date="2023-05-10"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-32221/">CVE-2022-32221</cve>
	<bugzilla href="https://bugzilla.suse.com/1204383">SUSE bug 1204383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205287">SUSE bug 1205287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205834">SUSE bug 1205834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206236">SUSE bug 1206236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208340">SUSE bug 1208340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211233">SUSE bug 1211233</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721618" comment="curl-7.66.0-150200.4.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721620" comment="libcurl4-7.66.0-150200.4.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202232250" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-32250</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-32250" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-32250" ref_url="https://www.suse.com/security/cve/CVE-2022-32250" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2875-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S2QMD6CJ6PZDFYQ3RKSOGAZNRK7WC5W7/" source="SUSE-SU"/>
    <description>
    net/netfilter/nf_tables_api.c in the Linux kernel through 5.18.1 allows a local user (able to create user/net namespaces) to escalate privileges to root because an incorrect NFT_STATEFUL_EXPR check leads to a use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2023-01-21"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32250/">CVE-2022-32250</cve>
	<bugzilla href="https://bugzilla.suse.com/1200015">SUSE bug 1200015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200268">SUSE bug 1200268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200494">SUSE bug 1200494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202992">SUSE bug 1202992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202993">SUSE bug 1202993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203002">SUSE bug 1203002</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009706514" comment="kernel-default-5.3.18-150300.59.90.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009706515" comment="kernel-default-base-5.3.18-150300.59.90.1.150300.18.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009684736" comment="kernel-rt-5.3.18-150300.93.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202232296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-32296</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-32296" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-32296" ref_url="https://www.suse.com/security/cve/CVE-2022-32296" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    The Linux kernel before 5.17.9 allows TCP servers to identify clients by observing what source ports are used. This occurs because of use of Algorithm 4 ("Double-Hash Port Selection Algorithm") of RFC 6056.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-01"/>
	<updated date="2022-12-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-32296/">CVE-2022-32296</cve>
	<bugzilla href="https://bugzilla.suse.com/1200288">SUSE bug 1200288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721582" comment="kernel-rt-5.3.18-150300.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3234</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3234" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3234" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3234" ref_url="https://www.suse.com/security/cve/CVE-2022-3234" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:3228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0483.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-30"/>
	<updated date="2023-03-31"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3234/">CVE-2022-3234</cve>
	<bugzilla href="https://bugzilla.suse.com/1203508">SUSE bug 1203508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206240">SUSE bug 1206240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208002">SUSE bug 1208002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208308">SUSE bug 1208308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208651">SUSE bug 1208651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209329">SUSE bug 1209329</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009726770" comment="vim-data-common-9.0.0814-150000.5.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009726850" comment="vim-small-9.0.0814-150000.5.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3235</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3235" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3235" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3235" ref_url="https://www.suse.com/security/cve/CVE-2022-3235" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:3228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    Use After Free in GitHub repository vim/vim prior to 9.0.0490.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-30"/>
	<updated date="2023-03-02"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3235/">CVE-2022-3235</cve>
	<bugzilla href="https://bugzilla.suse.com/1203509">SUSE bug 1203509</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009726770" comment="vim-data-common-9.0.0814-150000.5.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009726850" comment="vim-small-9.0.0814-150000.5.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3239</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3239" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3239" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3239" ref_url="https://www.suse.com/security/cve/CVE-2022-3239" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    A flaw use after free in the Linux kernel video4linux driver was found in the way user triggers em28xx_usb_probe() for the Empia 28xx based TV cards. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-27"/>
	<updated date="2022-12-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3239/">CVE-2022-3239</cve>
	<bugzilla href="https://bugzilla.suse.com/1203552">SUSE bug 1203552</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721862" comment="kernel-default-5.3.18-150300.59.98.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721863" comment="kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721582" comment="kernel-rt-5.3.18-150300.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202232742" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-32742</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-32742" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32742" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-32742" ref_url="https://www.suse.com/security/cve/CVE-2022-32742" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2586-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013535.html" source="SUSE-SU"/>
    <description>
    A flaw was found in Samba. Some SMB1 write requests were not correctly range-checked to ensure the client had sent enough data to fulfill the write, allowing server memory contents to be written into the file (or printer) instead of client-supplied data. The client cannot control the area of the server memory written to the file (or printer).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2023-07-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-32742/">CVE-2022-32742</cve>
	<bugzilla href="https://bugzilla.suse.com/1201496">SUSE bug 1201496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202815">SUSE bug 1202815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009703896" comment="libldb2-2.4.3-150300.3.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291435" comment="libldb2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009728218" comment="samba-client-libs-4.15.12+git.535.7750e5c95ef-150300.3.43.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009666847" comment="samba-client-libs is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202232743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-32743</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-32743" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32743" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-32743" ref_url="https://www.suse.com/security/cve/CVE-2022-32743" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012905.html" source="SUSE-SU"/>
    <description>
    Samba does not validate the Validated-DNS-Host-Name right for the dNSHostName attribute which could permit unprivileged users to write it.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-13"/>
	<updated date="2023-03-21"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-32743/">CVE-2022-32743</cve>
	<bugzilla href="https://bugzilla.suse.com/1202803">SUSE bug 1202803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209483">SUSE bug 1209483</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009709824" comment="samba-client-libs-4.15.8+git.527.8d0c05d313e-150300.3.40.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009666847" comment="samba-client-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202232744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-32744</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-32744" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32744" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-32744" ref_url="https://www.suse.com/security/cve/CVE-2022-32744" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2586-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013535.html" source="SUSE-SU"/>
    <description>
    A flaw was found in Samba. The KDC accepts kpasswd requests encrypted with any key known to it. By encrypting forged kpasswd requests with its own key, a user can change other users' passwords, enabling full domain takeover.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2023-03-24"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32744/">CVE-2022-32744</cve>
	<bugzilla href="https://bugzilla.suse.com/1201493">SUSE bug 1201493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202815">SUSE bug 1202815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209664">SUSE bug 1209664</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009703896" comment="libldb2-2.4.3-150300.3.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291435" comment="libldb2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009728218" comment="samba-client-libs-4.15.12+git.535.7750e5c95ef-150300.3.43.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009666847" comment="samba-client-libs is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202232745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-32745</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-32745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32745" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-32745" ref_url="https://www.suse.com/security/cve/CVE-2022-32745" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2586-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013535.html" source="SUSE-SU"/>
    <description>
    A flaw was found in Samba. Samba AD users can cause the server to access uninitialized data with an LDAP add or modify the request, usually resulting in a segmentation fault.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2023-02-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-32745/">CVE-2022-32745</cve>
	<bugzilla href="https://bugzilla.suse.com/1201492">SUSE bug 1201492</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009703896" comment="libldb2-2.4.3-150300.3.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291435" comment="libldb2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009728218" comment="samba-client-libs-4.15.12+git.535.7750e5c95ef-150300.3.43.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009666847" comment="samba-client-libs is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202232746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-32746</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-32746" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32746" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-32746" ref_url="https://www.suse.com/security/cve/CVE-2022-32746" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2586-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014245.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Samba AD LDAP server. The AD DC database audit logging module can access LDAP message values freed by a preceding database module, resulting in a use-after-free issue. This issue is only possible when modifying certain privileged attributes, such as userAccountControl.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2023-06-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-32746/">CVE-2022-32746</cve>
	<bugzilla href="https://bugzilla.suse.com/1201490">SUSE bug 1201490</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009751546" comment="libldb2-2.4.4-150300.3.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291435" comment="libldb2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009751559" comment="samba-client-libs-4.15.13+git.636.53d93c5b9d6-150300.3.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009666847" comment="samba-client-libs is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223278" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3278</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3278" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3278" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3278" ref_url="https://www.suse.com/security/cve/CVE-2022-3278" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:3228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0552.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-30"/>
	<updated date="2023-03-02"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3278/">CVE-2022-3278</cve>
	<bugzilla href="https://bugzilla.suse.com/1203799">SUSE bug 1203799</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009726770" comment="vim-data-common-9.0.0814-150000.5.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009726850" comment="vim-small-9.0.0814-150000.5.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3296</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3296" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3296" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3296" ref_url="https://www.suse.com/security/cve/CVE-2022-3296" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:3228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    Stack-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0577.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-30"/>
	<updated date="2023-03-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-3296/">CVE-2022-3296</cve>
	<bugzilla href="https://bugzilla.suse.com/1203796">SUSE bug 1203796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205395">SUSE bug 1205395</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009726770" comment="vim-data-common-9.0.0814-150000.5.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009726850" comment="vim-small-9.0.0814-150000.5.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3297</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3297" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3297" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3297" ref_url="https://www.suse.com/security/cve/CVE-2022-3297" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:3228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    Use After Free in GitHub repository vim/vim prior to 9.0.0579.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-30"/>
	<updated date="2023-03-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3297/">CVE-2022-3297</cve>
	<bugzilla href="https://bugzilla.suse.com/1203797">SUSE bug 1203797</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009726770" comment="vim-data-common-9.0.0814-150000.5.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009726850" comment="vim-small-9.0.0814-150000.5.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223303" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3303</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3303" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3303" ref_url="https://www.suse.com/security/cve/CVE-2022-3303" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
    <description>
    A race condition flaw was found in the Linux kernel sound subsystem due to improper locking. It could lead to a NULL pointer dereference while handling the SNDCTL_DSP_SYNC ioctl. A privileged local user (root or member of the audio group) could use this flaw to crash the system, resulting in a denial of service condition
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-27"/>
	<updated date="2023-06-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3303/">CVE-2022-3303</cve>
	<bugzilla href="https://bugzilla.suse.com/1203769">SUSE bug 1203769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212304">SUSE bug 1212304</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721862" comment="kernel-default-5.3.18-150300.59.98.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721863" comment="kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721582" comment="kernel-rt-5.3.18-150300.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202233068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-33068</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-33068" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33068" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-33068" ref_url="https://www.suse.com/security/cve/CVE-2022-33068" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2663-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MJ2G563AHSBZG4OGZ6WVW7U5ARNA4K5R/" source="SUSE-SU"/>
    <description>
    An integer overflow in the component hb-ot-shape-fallback.cc of Harfbuzz v4.3.0 allows attackers to cause a Denial of Service (DoS) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2022-09-02"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-33068/">CVE-2022-33068</cve>
	<bugzilla href="https://bugzilla.suse.com/1200900">SUSE bug 1200900</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009702166" comment="libharfbuzz0-2.6.4-150200.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153263" comment="libharfbuzz0 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202233196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-33196</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-33196" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33196" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-33196" ref_url="https://www.suse.com/security/cve/CVE-2022-33196" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0568-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013926.html" source="SUSE-SU"/>
    <description>
    Incorrect default permissions in some memory controller configurations for some Intel(R) Xeon(R) Processors when using Intel(R) Software Guard Extensions which may allow a privileged user to potentially enable escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-01"/>
	<updated date="2023-08-02"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-33196/">CVE-2022-33196</cve>
	<bugzilla href="https://bugzilla.suse.com/1208276">SUSE bug 1208276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209936">SUSE bug 1209936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211490">SUSE bug 1211490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211511">SUSE bug 1211511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213820">SUSE bug 1213820</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009739934" comment="ucode-intel-20230214-150200.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009169251" comment="ucode-intel is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223324" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3324</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3324" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3324" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3324" ref_url="https://www.suse.com/security/cve/CVE-2022-3324" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:3228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    Stack-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0598.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-30"/>
	<updated date="2023-03-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3324/">CVE-2022-3324</cve>
	<bugzilla href="https://bugzilla.suse.com/1203820">SUSE bug 1203820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205395">SUSE bug 1205395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206240">SUSE bug 1206240</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009726770" comment="vim-data-common-9.0.0814-150000.5.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009726850" comment="vim-small-9.0.0814-150000.5.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3352</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3352" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3352" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3352" ref_url="https://www.suse.com/security/cve/CVE-2022-3352" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:3228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    Use After Free in GitHub repository vim/vim prior to 9.0.0614.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-30"/>
	<updated date="2023-03-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-3352/">CVE-2022-3352</cve>
	<bugzilla href="https://bugzilla.suse.com/1203924">SUSE bug 1203924</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009726770" comment="vim-data-common-9.0.0814-150000.5.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009726850" comment="vim-small-9.0.0814-150000.5.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202233740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-33740</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-33740" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33740" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-33740" ref_url="https://www.suse.com/security/cve/CVE-2022-33740" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2875-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2892-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012866.html" source="SUSE-SU"/>
    <description>
    Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don't zero memory regions before sharing them with the backend (CVE-2022-26365, CVE-2022-33740). Additionally the granularity of the grant table doesn't allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend (CVE-2022-33741, CVE-2022-33742).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-24"/>
	<updated date="2022-11-13"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-33740/">CVE-2022-33740</cve>
	<bugzilla href="https://bugzilla.suse.com/1200762">SUSE bug 1200762</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009706514" comment="kernel-default-5.3.18-150300.59.90.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009706515" comment="kernel-default-base-5.3.18-150300.59.90.1.150300.18.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009707566" comment="kernel-rt-5.3.18-150300.99.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009718861" comment="xen-libs-4.14.5_06-150300.3.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202233741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-33741</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-33741" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33741" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-33741" ref_url="https://www.suse.com/security/cve/CVE-2022-33741" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2875-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2892-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012866.html" source="SUSE-SU"/>
    <description>
    Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don't zero memory regions before sharing them with the backend (CVE-2022-26365, CVE-2022-33740). Additionally the granularity of the grant table doesn't allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend (CVE-2022-33741, CVE-2022-33742).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-24"/>
	<updated date="2022-11-13"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-33741/">CVE-2022-33741</cve>
	<bugzilla href="https://bugzilla.suse.com/1200762">SUSE bug 1200762</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009706514" comment="kernel-default-5.3.18-150300.59.90.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009706515" comment="kernel-default-base-5.3.18-150300.59.90.1.150300.18.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009707566" comment="kernel-rt-5.3.18-150300.99.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009718861" comment="xen-libs-4.14.5_06-150300.3.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202233742" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-33742</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-33742" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33742" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-33742" ref_url="https://www.suse.com/security/cve/CVE-2022-33742" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2875-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2892-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012866.html" source="SUSE-SU"/>
    <description>
    Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don't zero memory regions before sharing them with the backend (CVE-2022-26365, CVE-2022-33740). Additionally the granularity of the grant table doesn't allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend (CVE-2022-33741, CVE-2022-33742).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-24"/>
	<updated date="2022-11-13"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-33742/">CVE-2022-33742</cve>
	<bugzilla href="https://bugzilla.suse.com/1200762">SUSE bug 1200762</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009706514" comment="kernel-default-5.3.18-150300.59.90.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009706515" comment="kernel-default-base-5.3.18-150300.59.90.1.150300.18.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009707566" comment="kernel-rt-5.3.18-150300.99.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009718861" comment="xen-libs-4.14.5_06-150300.3.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202233745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-33745</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-33745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-33745" ref_url="https://www.suse.com/security/cve/CVE-2022-33745" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012580.html" source="SUSE-SU"/>
    <description>
    insufficient TLB flush for x86 PV guests in shadow mode For migration as well as to work around kernels unaware of L1TF (see XSA-273), PV guests may be run in shadow paging mode. To address XSA-401, code was moved inside a function in Xen. This code movement missed a variable changing meaning / value between old and new code positions. The now wrong use of the variable did lead to a wrong TLB flush condition, omitting flushes where such are necessary.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2022-10-23"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-33745/">CVE-2022-33745</cve>
	<bugzilla href="https://bugzilla.suse.com/1201394">SUSE bug 1201394</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009718861" comment="xen-libs-4.14.5_06-150300.3.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202233746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-33746</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-33746" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-33746" ref_url="https://www.suse.com/security/cve/CVE-2022-33746" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013122.html" source="SUSE-SU"/>
    <description>
    P2M pool freeing may take excessively long The P2M pool backing second level address translation for guests may be of significant size. Therefore its freeing may take more time than is reasonable without intermediate preemption checks. Such checking for the need to preempt was so far missing.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-20"/>
	<updated date="2022-12-21"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-33746/">CVE-2022-33746</cve>
	<bugzilla href="https://bugzilla.suse.com/1203806">SUSE bug 1203806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724870" comment="xen-libs-4.14.5_08-150300.3.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202233747" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-33747</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-33747" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-33747" ref_url="https://www.suse.com/security/cve/CVE-2022-33747" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012939.html" source="SUSE-SU"/>
    <description>
    Arm: unbounded memory consumption for 2nd-level page tables Certain actions require e.g. removing pages from a guest's P2M (Physical-to-Machine) mapping. When large pages are in use to map guest pages in the 2nd-stage page tables, such a removal operation may incur a memory allocation (to replace a large mapping with individual smaller ones). These memory allocations are taken from the global memory pool. A malicious guest might be able to cause the global memory pool to be exhausted by manipulating its own P2M mappings.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-13"/>
	<updated date="2023-01-14"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-33747/">CVE-2022-33747</cve>
	<bugzilla href="https://bugzilla.suse.com/1203804">SUSE bug 1203804</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724870" comment="xen-libs-4.14.5_08-150300.3.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202233748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-33748</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-33748" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-33748" ref_url="https://www.suse.com/security/cve/CVE-2022-33748" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013122.html" source="SUSE-SU"/>
    <description>
    lock order inversion in transitive grant copy handling As part of XSA-226 a missing cleanup call was inserted on an error handling path. While doing so, locking requirements were not paid attention to. As a result two cooperating guests granting each other transitive grants can cause locks to be acquired nested within one another, but in respectively opposite order. With suitable timing between the involved grant copy operations this may result in the locking up of a CPU.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-20"/>
	<updated date="2022-12-21"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-33748/">CVE-2022-33748</cve>
	<bugzilla href="https://bugzilla.suse.com/1203807">SUSE bug 1203807</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724870" comment="xen-libs-4.14.5_08-150300.3.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202233981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-33981</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-33981" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-33981" ref_url="https://www.suse.com/security/cve/CVE-2022-33981" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2424-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2422-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UCV6OZAODHO3XSCOPNA6KBP5EOWSRH4L/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2549-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YODNNJY6VGTGGVMUQLFLWV5FFYHIFW3C/" source="SUSE-SU"/>
    <description>
    drivers/block/floppy.c in the Linux kernel before 5.17.6 is vulnerable to a denial of service, because of a concurrency use-after-free flaw after deallocating raw_cmd in the raw_cmd_ioctl function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2023-02-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-33981/">CVE-2022-33981</cve>
	<bugzilla href="https://bugzilla.suse.com/1200692">SUSE bug 1200692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705486" comment="kernel-default-5.3.18-150300.59.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705487" comment="kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009698643" comment="kernel-rt-5.3.18-150300.96.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3424</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3424" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3424" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3424" ref_url="https://www.suse.com/security/cve/CVE-2022-3424" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4273-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/026621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in the Linux kernel’s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-13"/>
	<updated date="2023-06-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3424/">CVE-2022-3424</cve>
	<bugzilla href="https://bugzilla.suse.com/1204166">SUSE bug 1204166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204167">SUSE bug 1204167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208044">SUSE bug 1208044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212309">SUSE bug 1212309</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724521" comment="kernel-default-5.3.18-150300.59.101.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724522" comment="kernel-default-base-5.3.18-150300.59.101.1.150300.18.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724435" comment="kernel-rt-5.3.18-150300.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202234266" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-34266</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-34266" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34266" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-34266" ref_url="https://www.suse.com/security/cve/CVE-2022-34266" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012599.html" source="SUSE-SU"/>
    <description>
    The libtiff-4.0.3-35.amzn2.0.1 package for LibTIFF on Amazon Linux 2 allows attackers to cause a denial of service (application crash), a different vulnerability than CVE-2022-0562. When processing a malicious TIFF file, an invalid range may be passed as an argument to the memset() function within TIFFFetchStripThing() in tif_dirread.c. This will cause TIFFFetchStripThing() to segfault after use of an uninitialized resource.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-22"/>
	<updated date="2023-02-16"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-34266/">CVE-2022-34266</cve>
	<bugzilla href="https://bugzilla.suse.com/1201723">SUSE bug 1201723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208311">SUSE bug 1208311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009718763" comment="libtiff5-4.0.9-150000.45.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3435</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3435" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3435" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3435" ref_url="https://www.suse.com/security/cve/CVE-2022-3435" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013757.html" source="SUSE-SU"/>
    <description>
    A vulnerability classified as problematic has been found in Linux Kernel. This affects the function fib_nh_match of the file net/ipv4/fib_semantics.c of the component IPv4 Handler. The manipulation leads to out-of-bounds read. It is possible to initiate the attack remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-210357 was assigned to this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-01-26"/>
	<updated date="2023-03-18"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3435/">CVE-2022-3435</cve>
	<bugzilla href="https://bugzilla.suse.com/1204171">SUSE bug 1204171</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009735606" comment="kernel-default-5.3.18-150300.59.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009735607" comment="kernel-default-base-5.3.18-150300.59.109.1.150300.18.62.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009734769" comment="kernel-rt-5.3.18-150300.115.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223437" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3437</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3437" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3437" ref_url="https://www.suse.com/security/cve/CVE-2022-3437" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013535.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2023:0019-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WO45C5LQHPOWEJHKWCXPWLI54XMTTYQP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2023:0020-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VCW7YX6RG5EAFBRU3SLTXKN5NWVODXTH/" source="SUSE-SU"/>
    <description>
    A heap-based buffer overflow vulnerability was found in Samba within the GSSAPI unwrap_des() and unwrap_des3() routines of Heimdal. The DES and Triple-DES decryption routines in the Heimdal GSSAPI library allow a length-limited write buffer overflow on malloc() allocated memory when presented with a maliciously small packet. This flaw allows a remote user to send specially crafted malicious data to the application, possibly resulting in a denial of service (DoS) attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-12-10"/>
	<updated date="2023-03-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-3437/">CVE-2022-3437</cve>
	<bugzilla href="https://bugzilla.suse.com/1204254">SUSE bug 1204254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205667">SUSE bug 1205667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208992">SUSE bug 1208992</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009728218" comment="samba-client-libs-4.15.12+git.535.7750e5c95ef-150300.3.43.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009666847" comment="samba-client-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202234526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-34526</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-34526" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34526" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-34526" ref_url="https://www.suse.com/security/cve/CVE-2022-34526" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012599.html" source="SUSE-SU"/>
    <description>
    A stack overflow was discovered in the _TIFFVGetField function of Tiffsplit v4.4.0. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted TIFF file parsed by the "tiffsplit" or "tiffcrop" utilities.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-22"/>
	<updated date="2023-02-16"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-34526/">CVE-2022-34526</cve>
	<bugzilla href="https://bugzilla.suse.com/1202026">SUSE bug 1202026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205073">SUSE bug 1205073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205505">SUSE bug 1205505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208338">SUSE bug 1208338</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009718763" comment="libtiff5-4.0.9-150000.45.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3479</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3479" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3479" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3479" ref_url="https://www.suse.com/security/cve/CVE-2022-3479" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013518.html" source="SUSE-SU"/>
    <description>
    A vulnerability found in nss. By this security vulnerability, nss client auth crash without a user certificate in the database and this can lead us to a segmentation fault or crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-01-25"/>
	<updated date="2023-01-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3479/">CVE-2022-3479</cve>
	<bugzilla href="https://bugzilla.suse.com/1204272">SUSE bug 1204272</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009732313" comment="libfreebl3-3.79.3-150000.3.90.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009732315" comment="libfreebl3-hmac-3.79.3-150000.3.90.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244408" comment="libfreebl3-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009732317" comment="libsoftokn3-3.79.3-150000.3.90.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009732319" comment="libsoftokn3-hmac-3.79.3-150000.3.90.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244410" comment="libsoftokn3-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009732321" comment="mozilla-nss-3.79.3-150000.3.90.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009732323" comment="mozilla-nss-certs-3.79.3-150000.3.90.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009732328" comment="mozilla-nss-tools-3.79.3-150000.3.90.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202234903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-34903</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-34903" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34903" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-34903" ref_url="https://www.suse.com/security/cve/CVE-2022-34903" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012160.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2546-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UMS2EFUBD5STY4WAK6LMDRF7EQ4XP4IJ/" source="SUSE-SU"/>
    <description>
    GnuPG through 2.3.6, in unusual situations where an attacker possesses any secret-key information from a victim's keyring and other constraints (e.g., use of GPGME) are met, allows signature forgery via injection into the status line.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2023-04-29"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-34903/">CVE-2022-34903</cve>
	<bugzilla href="https://bugzilla.suse.com/1201225">SUSE bug 1201225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705485" comment="gpg2-2.2.27-150300.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151446" comment="gpg2 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3491</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3491" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3491" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3491" ref_url="https://www.suse.com/security/cve/CVE-2022-3491" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:3493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013598.html" source="SUSE-SU"/>
    <description>
    Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0742.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-12-29"/>
	<updated date="2023-03-18"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3491/">CVE-2022-3491</cve>
	<bugzilla href="https://bugzilla.suse.com/1206028">SUSE bug 1206028</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009729554" comment="vim-data-common-9.0.1040-150000.5.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009729641" comment="vim-small-9.0.1040-150000.5.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202234918" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-34918</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-34918" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-34918" ref_url="https://www.suse.com/security/cve/CVE-2022-34918" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2424-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011950.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2422-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UCV6OZAODHO3XSCOPNA6KBP5EOWSRH4L/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2549-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YODNNJY6VGTGGVMUQLFLWV5FFYHIFW3C/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2022-09-02"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-34918/">CVE-2022-34918</cve>
	<bugzilla href="https://bugzilla.suse.com/1201171">SUSE bug 1201171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201177">SUSE bug 1201177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201222">SUSE bug 1201222</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705486" comment="kernel-default-5.3.18-150300.59.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009705487" comment="kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009698643" comment="kernel-rt-5.3.18-150300.96.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3515</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3515" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3515" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3515" ref_url="https://www.suse.com/security/cve/CVE-2022-3515" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012607.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2666-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012597.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in the Libksba library due to an integer overflow within the CRL parser. The vulnerability can be exploited remotely for code execution on the target system by passing specially crafted data to the application, for example, a malicious S/MIME attachment.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-22"/>
	<updated date="2023-04-29"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3515/">CVE-2022-3515</cve>
	<bugzilla href="https://bugzilla.suse.com/1204357">SUSE bug 1204357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204806">SUSE bug 1204806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205080">SUSE bug 1205080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205592">SUSE bug 1205592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205627">SUSE bug 1205627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206244">SUSE bug 1206244</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009718554" comment="libksba8-1.3.5-150000.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152539" comment="libksba8 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3520</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3520" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3520" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3520" ref_url="https://www.suse.com/security/cve/CVE-2022-3520" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:3493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013598.html" source="SUSE-SU"/>
    <description>
    Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0765.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-12-29"/>
	<updated date="2023-03-31"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3520/">CVE-2022-3520</cve>
	<bugzilla href="https://bugzilla.suse.com/1206071">SUSE bug 1206071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208100">SUSE bug 1208100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208649">SUSE bug 1208649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208651">SUSE bug 1208651</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009729554" comment="vim-data-common-9.0.1040-150000.5.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009729641" comment="vim-small-9.0.1040-150000.5.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3521</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3521" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3521" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3521" ref_url="https://www.suse.com/security/cve/CVE-2022-3521" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4273-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/026621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function kcm_tx_work of the file net/kcm/kcmsock.c of the component kcm. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. VDB-211018 is the identifier assigned to this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-13"/>
	<updated date="2022-12-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3521/">CVE-2022-3521</cve>
	<bugzilla href="https://bugzilla.suse.com/1204355">SUSE bug 1204355</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724521" comment="kernel-default-5.3.18-150300.59.101.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724522" comment="kernel-default-base-5.3.18-150300.59.101.1.150300.18.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724435" comment="kernel-rt-5.3.18-150300.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3524</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3524" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3524" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3524" ref_url="https://www.suse.com/security/cve/CVE-2022-3524" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4273-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/026621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function ipv6_renew_options of the component IPv6 Handler. The manipulation leads to memory leak. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-211021 was assigned to this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-13"/>
	<updated date="2023-06-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3524/">CVE-2022-3524</cve>
	<bugzilla href="https://bugzilla.suse.com/1204354">SUSE bug 1204354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212320">SUSE bug 1212320</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724521" comment="kernel-default-5.3.18-150300.59.101.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724522" comment="kernel-default-base-5.3.18-150300.59.101.1.150300.18.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724435" comment="kernel-rt-5.3.18-150300.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202235252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-35252</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-35252" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35252" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-35252" ref_url="https://www.suse.com/security/cve/CVE-2022-35252" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2039-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/024833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2040-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/024834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2041-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/024835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2042-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/024836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3005-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012702.html" source="SUSE-SU"/>
    <description>
    When curl is used to retrieve and parse cookies from a HTTP(S) server, itaccepts cookies using control codes that when later are sent back to a HTTPserver might make the server return 400 responses. Effectively allowing a"sister site" to deny service to all siblings.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-03"/>
	<updated date="2023-04-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-35252/">CVE-2022-35252</cve>
	<bugzilla href="https://bugzilla.suse.com/1202593">SUSE bug 1202593</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009708371" comment="curl-7.66.0-150200.4.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009708372" comment="libcurl4-7.66.0-150200.4.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3535</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3535" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3535" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3535" ref_url="https://www.suse.com/security/cve/CVE-2022-3535" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-13"/>
	<updated date="2022-12-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3535/">CVE-2022-3535</cve>
	<bugzilla href="https://bugzilla.suse.com/1204417">SUSE bug 1204417</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724521" comment="kernel-default-5.3.18-150300.59.101.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724522" comment="kernel-default-base-5.3.18-150300.59.101.1.150300.18.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724435" comment="kernel-rt-5.3.18-150300.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202235414" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-35414</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-35414" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35414" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-35414" ref_url="https://www.suse.com/security/cve/CVE-2022-35414" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3795-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014067.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** softmmu/physmem.c in QEMU through 7.0.0 can perform an uninitialized read on the translate_fail path, leading to an io_readx or io_writex crash. NOTE: a third party states that the Non-virtualization Use Case in the qemu.org reference applies here, i.e., "Bugs affecting the non-virtualization use case are not considered security bugs at this time."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-20"/>
	<updated date="2023-03-17"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-35414/">CVE-2022-35414</cve>
	<bugzilla href="https://bugzilla.suse.com/1201367">SUSE bug 1201367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009717329" comment="qemu-5.2.0-150300.118.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009717046" comment="qemu-arm-5.2.0-150300.118.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009717330" comment="qemu-audio-spice-5.2.0-150300.118.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623393" comment="qemu-audio-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009717331" comment="qemu-chardev-spice-5.2.0-150300.118.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623395" comment="qemu-chardev-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009717332" comment="qemu-guest-agent-5.2.0-150300.118.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009717333" comment="qemu-hw-display-qxl-5.2.0-150300.118.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623396" comment="qemu-hw-display-qxl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009717334" comment="qemu-hw-display-virtio-gpu-5.2.0-150300.118.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623397" comment="qemu-hw-display-virtio-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009717335" comment="qemu-hw-display-virtio-vga-5.2.0-150300.118.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623399" comment="qemu-hw-display-virtio-vga is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009717336" comment="qemu-hw-usb-redirect-5.2.0-150300.118.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623401" comment="qemu-hw-usb-redirect is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009717063" comment="qemu-ipxe-1.0.0+-150300.118.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009717069" comment="qemu-seabios-1.14.0_0_g155821a-150300.118.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009717070" comment="qemu-sgabios-8-150300.118.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009717337" comment="qemu-tools-5.2.0-150300.118.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009717338" comment="qemu-ui-opengl-5.2.0-150300.118.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623406" comment="qemu-ui-opengl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009717339" comment="qemu-ui-spice-core-5.2.0-150300.118.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623407" comment="qemu-ui-spice-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009717077" comment="qemu-vgabios-1.14.0_0_g155821a-150300.118.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009717078" comment="qemu-x86-5.2.0-150300.118.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3542</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3542" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3542" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3542" ref_url="https://www.suse.com/security/cve/CVE-2022-3542" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4273-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/026621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-13"/>
	<updated date="2022-12-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3542/">CVE-2022-3542</cve>
	<bugzilla href="https://bugzilla.suse.com/1204402">SUSE bug 1204402</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724521" comment="kernel-default-5.3.18-150300.59.101.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724522" comment="kernel-default-base-5.3.18-150300.59.101.1.150300.18.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724435" comment="kernel-rt-5.3.18-150300.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3545</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3545" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3545" ref_url="https://www.suse.com/security/cve/CVE-2022-3545" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4273-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/026621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4560-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-December/026940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4569-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-December/026938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-13"/>
	<updated date="2023-03-30"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3545/">CVE-2022-3545</cve>
	<bugzilla href="https://bugzilla.suse.com/1204415">SUSE bug 1204415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204424">SUSE bug 1204424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209225">SUSE bug 1209225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724521" comment="kernel-default-5.3.18-150300.59.101.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724522" comment="kernel-default-base-5.3.18-150300.59.101.1.150300.18.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724435" comment="kernel-rt-5.3.18-150300.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3554</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3554" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3554" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3554" ref_url="https://www.suse.com/security/cve/CVE-2022-3554" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:3018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3987-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012928.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-16"/>
	<updated date="2023-02-10"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3554/">CVE-2022-3554</cve>
	<bugzilla href="https://bugzilla.suse.com/1204422">SUSE bug 1204422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721860" comment="libX11-6-1.6.5-150000.3.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151817" comment="libX11-6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721528" comment="libX11-data-1.6.5-150000.3.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151819" comment="libX11-data is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721861" comment="libX11-xcb1-1.6.5-150000.3.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151821" comment="libX11-xcb1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3555</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3555" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3555" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3555" ref_url="https://www.suse.com/security/cve/CVE-2022-3555" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:3018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3987-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0668-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029045.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-16"/>
	<updated date="2023-04-28"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3555/">CVE-2022-3555</cve>
	<bugzilla href="https://bugzilla.suse.com/1204425">SUSE bug 1204425</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009743227" comment="libX11-6-1.6.5-150000.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151817" comment="libX11-6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009743063" comment="libX11-data-1.6.5-150000.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151819" comment="libX11-data is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009743228" comment="libX11-xcb1-1.6.5-150000.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151821" comment="libX11-xcb1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3564</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3564" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3564" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3564" ref_url="https://www.suse.com/security/cve/CVE-2022-3564" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013980.html" source="SUSE-SU"/>
    <description>
    A vulnerability classified as critical was found in Linux Kernel. Affected by this vulnerability is the function l2cap_reassemble_sdu of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211087.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-01-26"/>
	<updated date="2023-03-18"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3564/">CVE-2022-3564</cve>
	<bugzilla href="https://bugzilla.suse.com/1206073">SUSE bug 1206073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206314">SUSE bug 1206314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208030">SUSE bug 1208030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208044">SUSE bug 1208044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208085">SUSE bug 1208085</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009735606" comment="kernel-default-5.3.18-150300.59.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009735607" comment="kernel-default-base-5.3.18-150300.59.109.1.150300.18.62.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009742406" comment="kernel-rt-5.3.18-150300.118.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3565</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3565" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3565" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3565" ref_url="https://www.suse.com/security/cve/CVE-2022-3565" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4273-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/026621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
    <description>
    A vulnerability, which was classified as critical, has been found in Linux Kernel. Affected by this issue is the function del_timer of the file drivers/isdn/mISDN/l1oip_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211088.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-13"/>
	<updated date="2023-06-14"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3565/">CVE-2022-3565</cve>
	<bugzilla href="https://bugzilla.suse.com/1204431">SUSE bug 1204431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204432">SUSE bug 1204432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208044">SUSE bug 1208044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212323">SUSE bug 1212323</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724521" comment="kernel-default-5.3.18-150300.59.101.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724522" comment="kernel-default-base-5.3.18-150300.59.101.1.150300.18.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724435" comment="kernel-rt-5.3.18-150300.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3567</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3567" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3567" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3567" ref_url="https://www.suse.com/security/cve/CVE-2022-3567" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2506-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029875.html" source="SUSE-SU"/>
    <description>
    A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function inet6_stream_ops/inet6_dgram_ops of the component IPv6 Handler. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. VDB-211090 is the identifier assigned to this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-12-24"/>
	<updated date="2023-06-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3567/">CVE-2022-3567</cve>
	<bugzilla href="https://bugzilla.suse.com/1204414">SUSE bug 1204414</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009729181" comment="kernel-default-5.3.18-150300.59.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009729182" comment="kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009729347" comment="kernel-rt-5.3.18-150300.112.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223570" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3570</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3570" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3570" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3570" ref_url="https://www.suse.com/security/cve/CVE-2022-3570" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013447.html" source="SUSE-SU"/>
    <description>
    Multiple heap buffer overflows in tiffcrop.c utility in libtiff library Version 4.4.0 allows attacker to trigger unsafe or out of bounds memory access via crafted TIFF image file which could result into application crash, potential information disclosure or any other context-dependent impact
    </description>
<advisory from="security@suse.de">
	<issued date="2022-12-14"/>
	<updated date="2023-02-10"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3570/">CVE-2022-3570</cve>
	<bugzilla href="https://bugzilla.suse.com/1205422">SUSE bug 1205422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009727260" comment="libtiff5-4.0.9-150000.45.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202235737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-35737</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-35737" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35737" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-35737" ref_url="https://www.suse.com/security/cve/CVE-2022-35737" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2666-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3307-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012378.html" source="SUSE-SU"/>
    <description>
    SQLite 1.0.12 through 3.39.x before 3.39.2 sometimes allows an array-bounds overflow if billions of bytes are used in a string argument to a C API.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-20"/>
	<updated date="2023-06-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-35737/">CVE-2022-35737</cve>
	<bugzilla href="https://bugzilla.suse.com/1201783">SUSE bug 1201783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203345">SUSE bug 1203345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211963">SUSE bug 1211963</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009711219" comment="libsqlite3-0-3.39.3-150000.3.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153745" comment="libsqlite3-0 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3577</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3577" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3577" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3577" ref_url="https://www.suse.com/security/cve/CVE-2022-3577" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4569-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-December/026938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds memory write flaw was found in the Linux kernel’s Kid-friendly Wired Controller driver. This flaw allows a local user to crash or potentially escalate their privileges on the system. It is in bigben_probe of drivers/hid/hid-bigbenff.c. The reason is incorrect assumption - bigben devices all have inputs. However, malicious devices can break this assumption, leaking to out-of-bound write.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-13"/>
	<updated date="2022-12-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3577/">CVE-2022-3577</cve>
	<bugzilla href="https://bugzilla.suse.com/1204470">SUSE bug 1204470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204486">SUSE bug 1204486</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724521" comment="kernel-default-5.3.18-150300.59.101.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724522" comment="kernel-default-base-5.3.18-150300.59.101.1.150300.18.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724435" comment="kernel-rt-5.3.18-150300.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3586</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3586" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3586" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3586" ref_url="https://www.suse.com/security/cve/CVE-2022-3586" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4273-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/026621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4560-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-December/026940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4569-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-December/026938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel’s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-13"/>
	<updated date="2023-06-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3586/">CVE-2022-3586</cve>
	<bugzilla href="https://bugzilla.suse.com/1204439">SUSE bug 1204439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204576">SUSE bug 1204576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208044">SUSE bug 1208044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209225">SUSE bug 1209225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212294">SUSE bug 1212294</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724521" comment="kernel-default-5.3.18-150300.59.101.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724522" comment="kernel-default-base-5.3.18-150300.59.101.1.150300.18.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724435" comment="kernel-rt-5.3.18-150300.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3591</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3591" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3591" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3591" ref_url="https://www.suse.com/security/cve/CVE-2022-3591" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:3493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013598.html" source="SUSE-SU"/>
    <description>
    Use After Free in GitHub repository vim/vim prior to 9.0.0789.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-12-29"/>
	<updated date="2023-03-18"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3591/">CVE-2022-3591</cve>
	<bugzilla href="https://bugzilla.suse.com/1206072">SUSE bug 1206072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208100">SUSE bug 1208100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208649">SUSE bug 1208649</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009729554" comment="vim-data-common-9.0.1040-150000.5.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009729641" comment="vim-small-9.0.1040-150000.5.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3594</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3594" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3594" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3594" ref_url="https://www.suse.com/security/cve/CVE-2022-3594" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4273-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/026621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function intr_callback of the file drivers/net/usb/r8152.c of the component BPF. The manipulation leads to logging of excessive data. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211363.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-13"/>
	<updated date="2022-12-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3594/">CVE-2022-3594</cve>
	<bugzilla href="https://bugzilla.suse.com/1204479">SUSE bug 1204479</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724521" comment="kernel-default-5.3.18-150300.59.101.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724522" comment="kernel-default-base-5.3.18-150300.59.101.1.150300.18.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724435" comment="kernel-rt-5.3.18-150300.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3597</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3597" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3597" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3597" ref_url="https://www.suse.com/security/cve/CVE-2022-3597" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013135.html" source="SUSE-SU"/>
    <description>
    LibTIFF 4.4.0 has an out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix.c:346 when called from extractImageSection, tools/tiffcrop.c:6826, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 236b7191.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-29"/>
	<updated date="2023-02-10"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3597/">CVE-2022-3597</cve>
	<bugzilla href="https://bugzilla.suse.com/1204641">SUSE bug 1204641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206220">SUSE bug 1206220</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009725556" comment="libtiff5-4.0.9-150000.45.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3598</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3598" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3598" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3598" ref_url="https://www.suse.com/security/cve/CVE-2022-3598" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013447.html" source="SUSE-SU"/>
    <description>
    LibTIFF 4.4.0 has an out-of-bounds write in extractContigSamplesShifted24bits in tools/tiffcrop.c:3604, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit cfbb883b.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-12-14"/>
	<updated date="2023-02-10"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3598/">CVE-2022-3598</cve>
	<bugzilla href="https://bugzilla.suse.com/1204642">SUSE bug 1204642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206220">SUSE bug 1206220</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009727260" comment="libtiff5-4.0.9-150000.45.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3599</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3599" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3599" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3599" ref_url="https://www.suse.com/security/cve/CVE-2022-3599" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013135.html" source="SUSE-SU"/>
    <description>
    LibTIFF 4.4.0 has an out-of-bounds read in writeSingleSection in tools/tiffcrop.c:7345, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit e8131125.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-29"/>
	<updated date="2023-02-10"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3599/">CVE-2022-3599</cve>
	<bugzilla href="https://bugzilla.suse.com/1204643">SUSE bug 1204643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206220">SUSE bug 1206220</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009725556" comment="libtiff5-4.0.9-150000.45.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223606" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3606</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3606" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3606" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3606" ref_url="https://www.suse.com/security/cve/CVE-2022-3606" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0409-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014076.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in Linux Kernel. It has been classified as problematic. This affects the function find_prog_by_sec_insn of the file tools/lib/bpf/libbpf.c of the component BPF. The manipulation leads to null pointer dereference. It is recommended to apply a patch to fix this issue. The identifier VDB-211749 was assigned to this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2023-03-18"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3606/">CVE-2022-3606</cve>
	<bugzilla href="https://bugzilla.suse.com/1204502">SUSE bug 1204502</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009739408" comment="kernel-default-5.3.18-150300.59.112.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009739409" comment="kernel-default-base-5.3.18-150300.59.112.1.150300.18.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009745026" comment="kernel-rt-5.3.18-150300.121.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202236109" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-36109</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-36109" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36109" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-36109" ref_url="https://www.suse.com/security/cve/CVE-2022-36109" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0795-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0795-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1625-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028425.html" source="SUSE-SU"/>
    <description>
    Moby is an open-source project created by Docker to enable software containerization. A bug was found in Moby (Docker Engine) where supplementary groups are not set up properly. If an attacker has direct access to a container and manipulates their supplementary group access, they may be able to use supplementary group access to bypass primary group restrictions in some cases, potentially gaining access to sensitive information or gaining the ability to execute code in that container. This bug is fixed in Moby (Docker Engine) 20.10.18. Running containers should be stopped and restarted for the permissions to be fixed. For users unable to upgrade, this problem can be worked around by not using the `"USER $USERNAME"` Dockerfile instruction. Instead by calling `ENTRYPOINT ["su", "-", "user"]` the supplementary groups will be set up properly.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-18"/>
	<updated date="2023-06-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-36109/">CVE-2022-36109</cve>
	<bugzilla href="https://bugzilla.suse.com/1205375">SUSE bug 1205375</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009743848" comment="docker-20.10.23_ce-150000.175.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152505" comment="docker is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3621</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3621" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3621" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3621" ref_url="https://www.suse.com/security/cve/CVE-2022-3621" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4273-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/026621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in Linux Kernel. It has been classified as problematic. Affected is the function nilfs_bmap_lookup_at_level of the file fs/nilfs2/inode.c of the component nilfs2. The manipulation leads to null pointer dereference. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211920.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-13"/>
	<updated date="2023-06-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3621/">CVE-2022-3621</cve>
	<bugzilla href="https://bugzilla.suse.com/1204574">SUSE bug 1204574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212295">SUSE bug 1212295</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724521" comment="kernel-default-5.3.18-150300.59.101.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724522" comment="kernel-default-base-5.3.18-150300.59.101.1.150300.18.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724435" comment="kernel-rt-5.3.18-150300.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3625</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3625" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3625" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3625" ref_url="https://www.suse.com/security/cve/CVE-2022-3625" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in Linux Kernel. It has been classified as critical. This affects the function devlink_param_set/devlink_param_get of the file net/core/devlink.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211929 was assigned to this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-13"/>
	<updated date="2022-12-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3625/">CVE-2022-3625</cve>
	<bugzilla href="https://bugzilla.suse.com/1204637">SUSE bug 1204637</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724521" comment="kernel-default-5.3.18-150300.59.101.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724522" comment="kernel-default-base-5.3.18-150300.59.101.1.150300.18.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724435" comment="kernel-rt-5.3.18-150300.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223626" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3626</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3626" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3626" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3626" ref_url="https://www.suse.com/security/cve/CVE-2022-3626" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013135.html" source="SUSE-SU"/>
    <description>
    LibTIFF 4.4.0 has an out-of-bounds write in _TIFFmemset in libtiff/tif_unix.c:340 when called from processCropSelections, tools/tiffcrop.c:7619, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 236b7191.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-29"/>
	<updated date="2023-02-10"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3626/">CVE-2022-3626</cve>
	<bugzilla href="https://bugzilla.suse.com/1204644">SUSE bug 1204644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206220">SUSE bug 1206220</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009725556" comment="libtiff5-4.0.9-150000.45.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3627</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3627" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3627" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3627" ref_url="https://www.suse.com/security/cve/CVE-2022-3627" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013135.html" source="SUSE-SU"/>
    <description>
    LibTIFF 4.4.0 has an out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix.c:346 when called from extractImageSection, tools/tiffcrop.c:6860, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 236b7191.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-29"/>
	<updated date="2023-02-10"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3627/">CVE-2022-3627</cve>
	<bugzilla href="https://bugzilla.suse.com/1204645">SUSE bug 1204645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206220">SUSE bug 1206220</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009725556" comment="libtiff5-4.0.9-150000.45.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223628" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3628</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3628" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3628" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3628" ref_url="https://www.suse.com/security/cve/CVE-2022-3628" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    A buffer overflow flaw was found in the Linux kernel Broadcom Full MAC Wi-Fi driver. This issue occurs when a user connects to a malicious USB device. This can allow a local user to crash the system or escalate their privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-12-24"/>
	<updated date="2023-03-18"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3628/">CVE-2022-3628</cve>
	<bugzilla href="https://bugzilla.suse.com/1204868">SUSE bug 1204868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009729181" comment="kernel-default-5.3.18-150300.59.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009729182" comment="kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009729347" comment="kernel-rt-5.3.18-150300.112.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202236280" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-36280</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-36280" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-36280" ref_url="https://www.suse.com/security/cve/CVE-2022-36280" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0767-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds(OOB) memory access vulnerability was found in vmwgfx driver in drivers/gpu/vmxgfx/vmxgfx_kms.c in GPU component in the Linux kernel with device file '/dev/dri/renderD128 (or Dxxx)'. This flaw allows a local attacker with a user account on the system to gain privilege, causing a denial of service(DoS).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-17"/>
	<updated date="2023-07-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-36280/">CVE-2022-36280</cve>
	<bugzilla href="https://bugzilla.suse.com/1203332">SUSE bug 1203332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744746" comment="kernel-default-5.3.18-150300.59.115.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744747" comment="kernel-default-base-5.3.18-150300.59.115.2.150300.18.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009745026" comment="kernel-rt-5.3.18-150300.121.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3629</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3629" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3629" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3629" ref_url="https://www.suse.com/security/cve/CVE-2022-3629" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4273-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/026621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in Linux Kernel. It has been declared as problematic. This vulnerability affects the function vsock_connect of the file net/vmw_vsock/af_vsock.c. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. VDB-211930 is the identifier assigned to this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-13"/>
	<updated date="2023-01-04"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3629/">CVE-2022-3629</cve>
	<bugzilla href="https://bugzilla.suse.com/1204635">SUSE bug 1204635</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724521" comment="kernel-default-5.3.18-150300.59.101.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724522" comment="kernel-default-base-5.3.18-150300.59.101.1.150300.18.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724435" comment="kernel-rt-5.3.18-150300.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3635</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3635" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3635" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3635" ref_url="https://www.suse.com/security/cve/CVE-2022-3635" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
    <description>
    A vulnerability, which was classified as critical, has been found in Linux Kernel. Affected by this issue is the function tst_timer of the file drivers/atm/idt77252.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. VDB-211934 is the identifier assigned to this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-12-24"/>
	<updated date="2023-06-14"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3635/">CVE-2022-3635</cve>
	<bugzilla href="https://bugzilla.suse.com/1204631">SUSE bug 1204631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204636">SUSE bug 1204636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208044">SUSE bug 1208044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212289">SUSE bug 1212289</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009729181" comment="kernel-default-5.3.18-150300.59.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009729182" comment="kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009729347" comment="kernel-rt-5.3.18-150300.112.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3640</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3640" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3640" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3640" ref_url="https://www.suse.com/security/cve/CVE-2022-3640" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4560-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-December/026940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    A vulnerability, which was classified as critical, was found in Linux Kernel. Affected is the function l2cap_conn_del of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211944.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-13"/>
	<updated date="2023-03-30"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3640/">CVE-2022-3640</cve>
	<bugzilla href="https://bugzilla.suse.com/1204619">SUSE bug 1204619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204624">SUSE bug 1204624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209225">SUSE bug 1209225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724521" comment="kernel-default-5.3.18-150300.59.101.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724522" comment="kernel-default-base-5.3.18-150300.59.101.1.150300.18.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724435" comment="kernel-rt-5.3.18-150300.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3643</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3643" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3643" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3643" ref_url="https://www.suse.com/security/cve/CVE-2022-3643" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013767.html" source="SUSE-SU"/>
    <description>
    Guests can trigger NIC interface reset/abort/crash via netback It is possible for a guest to trigger a NIC interface reset/abort/crash in a Linux based network backend by sending certain kinds of packets. It appears to be an (unwritten?) assumption in the rest of the Linux network stack that packet protocol headers are all contained within the linear section of the SKB and some NICs behave badly if this is not the case. This has been reported to occur with Cisco (enic) and Broadcom NetXtrem II BCM5780 (bnx2x) though it may be an issue with other NICs/drivers as well. In case the frontend is sending requests with split headers, netback will forward those violating above mentioned assumption to the networking core, resulting in said misbehavior.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-01-26"/>
	<updated date="2023-03-18"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-3643/">CVE-2022-3643</cve>
	<bugzilla href="https://bugzilla.suse.com/1206113">SUSE bug 1206113</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009735606" comment="kernel-default-5.3.18-150300.59.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009735607" comment="kernel-default-base-5.3.18-150300.59.109.1.150300.18.62.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009734769" comment="kernel-rt-5.3.18-150300.115.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3646</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3646" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3646" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3646" ref_url="https://www.suse.com/security/cve/CVE-2022-3646" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4273-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/026621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
    <description>
    A vulnerability, which was classified as problematic, has been found in Linux Kernel. This issue affects the function nilfs_attach_log_writer of the file fs/nilfs2/segment.c of the component BPF. The manipulation leads to memory leak. The attack may be initiated remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-211961 was assigned to this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-13"/>
	<updated date="2023-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3646/">CVE-2022-3646</cve>
	<bugzilla href="https://bugzilla.suse.com/1204646">SUSE bug 1204646</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724521" comment="kernel-default-5.3.18-150300.59.101.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724522" comment="kernel-default-base-5.3.18-150300.59.101.1.150300.18.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724435" comment="kernel-rt-5.3.18-150300.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223649" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3649</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3649" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3649" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3649" ref_url="https://www.suse.com/security/cve/CVE-2022-3649" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4273-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/026621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in Linux Kernel. It has been classified as problematic. Affected is the function nilfs_new_inode of the file fs/nilfs2/inode.c of the component BPF. The manipulation leads to use after free. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211992.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-13"/>
	<updated date="2023-06-14"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3649/">CVE-2022-3649</cve>
	<bugzilla href="https://bugzilla.suse.com/1204647">SUSE bug 1204647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212318">SUSE bug 1212318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724521" comment="kernel-default-5.3.18-150300.59.101.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724522" comment="kernel-default-base-5.3.18-150300.59.101.1.150300.18.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724435" comment="kernel-rt-5.3.18-150300.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3650</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3650" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3650" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3650" ref_url="https://www.suse.com/security/cve/CVE-2022-3650" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1580-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1581-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1581-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1584-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028377.html" source="SUSE-SU"/>
    <description>
    A privilege escalation flaw was found in Ceph. Ceph-crash.service allows a local attacker to escalate privileges to root in the form of a crash dump, and dump privileged information.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-28"/>
	<updated date="2023-05-03"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3650/">CVE-2022-3650</cve>
	<bugzilla href="https://bugzilla.suse.com/1204430">SUSE bug 1204430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009750861" comment="librados2-16.2.11.58+g38d6afd3b78-150300.5.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154240" comment="librados2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009750862" comment="librbd1-16.2.11.58+g38d6afd3b78-150300.5.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154244" comment="librbd1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202236879" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-36879</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-36879" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-36879" ref_url="https://www.suse.com/security/cve/CVE-2022-36879" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/025152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.18.14. xfrm_expand_policies in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-15"/>
	<updated date="2023-06-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-36879/">CVE-2022-36879</cve>
	<bugzilla href="https://bugzilla.suse.com/1201948">SUSE bug 1201948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212327">SUSE bug 1212327</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009711223" comment="kernel-default-5.3.18-150300.59.93.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009711224" comment="kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721582" comment="kernel-rt-5.3.18-150300.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202236946" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-36946</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-36946" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-36946" ref_url="https://www.suse.com/security/cve/CVE-2022-36946" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2875-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2892-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
    <description>
    nfqnl_mangle in net/netfilter/nfnetlink_queue.c in the Linux kernel through 5.18.14 allows remote attackers to cause a denial of service (panic) because, in the case of an nf_queue verdict with a one-byte nfta_payload attribute, an skb_pull can encounter a negative skb-&gt;len.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-24"/>
	<updated date="2023-06-14"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-36946/">CVE-2022-36946</cve>
	<bugzilla href="https://bugzilla.suse.com/1201940">SUSE bug 1201940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201941">SUSE bug 1201941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202312">SUSE bug 1202312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202874">SUSE bug 1202874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203208">SUSE bug 1203208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204132">SUSE bug 1204132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205313">SUSE bug 1205313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212310">SUSE bug 1212310</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009706514" comment="kernel-default-5.3.18-150300.59.90.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009706515" comment="kernel-default-base-5.3.18-150300.59.90.1.150300.18.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009707566" comment="kernel-rt-5.3.18-150300.99.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3705</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3705" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3705" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3705" ref_url="https://www.suse.com/security/cve/CVE-2022-3705" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:3228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013598.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in vim and classified as problematic. Affected by this issue is the function qf_update_buffer of the file quickfix.c of the component autocmd Handler. The manipulation leads to use after free. The attack may be launched remotely. Upgrading to version 9.0.0805 is able to address this issue. The name of the patch is d0fab10ed2a86698937e3c3fed2f10bd9bb5e731. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-212324.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-30"/>
	<updated date="2023-03-18"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-3705/">CVE-2022-3705</cve>
	<bugzilla href="https://bugzilla.suse.com/1204779">SUSE bug 1204779</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009729554" comment="vim-data-common-9.0.1040-150000.5.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009729641" comment="vim-small-9.0.1040-150000.5.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3707</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3707" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3707" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3707" ref_url="https://www.suse.com/security/cve/CVE-2022-3707" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    A double-free memory flaw was found in the Linux kernel. The Intel GVT-g graphics driver triggers VGA card system resource overload, causing a fail in the intel_gvt_dma_map_guest_page function. This issue could allow a local user to crash the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-12-24"/>
	<updated date="2023-03-18"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3707/">CVE-2022-3707</cve>
	<bugzilla href="https://bugzilla.suse.com/1204780">SUSE bug 1204780</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009729181" comment="kernel-default-5.3.18-150300.59.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009729182" comment="kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009729347" comment="kernel-rt-5.3.18-150300.112.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202237434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-37434</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-37434" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37434" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-37434" ref_url="https://www.suse.com/security/cve/CVE-2022-37434" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2005-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2007-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/024703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2039-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/024833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2040-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/024834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2041-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/024835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2042-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/024836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/012012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2947-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LMMKD42M3DCS4RHRGODUBFFD77ISKBSG/" source="SUSE-SU"/>
    <description>
    zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-01"/>
	<updated date="2023-04-29"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-37434/">CVE-2022-37434</cve>
	<bugzilla href="https://bugzilla.suse.com/1202175">SUSE bug 1202175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203030">SUSE bug 1203030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205074">SUSE bug 1205074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205289">SUSE bug 1205289</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009706291" comment="libz1-1.2.11-150000.3.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153971" comment="libz1 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202237454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-37454</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-37454" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37454" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-37454" ref_url="https://www.suse.com/security/cve/CVE-2022-37454" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:3228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4005-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014044.html" source="SUSE-SU"/>
    <description>
    The Keccak XKCP SHA-3 reference implementation before fdc6fef has an integer overflow and resultant buffer overflow that allows attackers to execute arbitrary code or eliminate expected cryptographic properties. This occurs in the sponge function interface.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-30"/>
	<updated date="2023-03-18"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-37454/">CVE-2022-37454</cve>
	<bugzilla href="https://bugzilla.suse.com/1204577">SUSE bug 1204577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204966">SUSE bug 1204966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205836">SUSE bug 1205836</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009726610" comment="libpython3_6m1_0-3.6.15-150300.10.37.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009726611" comment="python3-3.6.15-150300.10.37.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009726612" comment="python3-base-3.6.15-150300.10.37.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3775</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3775" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3775" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3775" ref_url="https://www.suse.com/security/cve/CVE-2022-3775" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014265.html" source="SUSE-SU"/>
		<reference ref_id="TID000021048" ref_url="https://www.suse.com/support/kb/doc/?id=000021048" source="SUSE-SU"/>
    <description>
    When rendering certain unicode sequences, grub2's font code doesn't proper validate if the informed glyph's width and height is constrained within bitmap size. As consequence an attacker can craft an input which will lead to a out-of-bounds write into grub2's heap, leading to memory corruption and availability issues. Although complex, arbitrary code execution could not be discarded.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-26"/>
	<updated date="2023-04-21"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3775/">CVE-2022-3775</cve>
	<bugzilla href="https://bugzilla.suse.com/1205182">SUSE bug 1205182</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009726393" comment="grub2-2.04-150300.22.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153175" comment="grub2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009726212" comment="grub2-arm64-efi-2.04-150300.22.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623763" comment="grub2-arm64-efi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009726213" comment="grub2-i386-pc-2.04-150300.22.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153178" comment="grub2-i386-pc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009726216" comment="grub2-snapper-plugin-2.04-150300.22.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153179" comment="grub2-snapper-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009726218" comment="grub2-x86_64-efi-2.04-150300.22.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153180" comment="grub2-x86_64-efi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009726221" comment="grub2-x86_64-xen-2.04-150300.22.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153181" comment="grub2-x86_64-xen is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202237966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-37966</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-37966" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37966" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-37966" ref_url="https://www.suse.com/security/cve/CVE-2022-37966" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0222-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V3YTRBE2CLOHDFXSGJQCTU4DTNHNRTBU/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013975.html" source="SUSE-SU"/>
    <description>
    Windows Kerberos RC4-HMAC Elevation of Privilege Vulnerability
    </description>
<advisory from="security@suse.de">
	<issued date="2023-01-03"/>
	<updated date="2023-03-24"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-37966/">CVE-2022-37966</cve>
	<bugzilla href="https://bugzilla.suse.com/1205385">SUSE bug 1205385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208347">SUSE bug 1208347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208433">SUSE bug 1208433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209664">SUSE bug 1209664</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009729960" comment="samba-client-libs-4.15.13+git.540.fab3b2a46c6-150300.3.46.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009666847" comment="samba-client-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202237967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-37967</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-37967" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37967" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-37967" ref_url="https://www.suse.com/security/cve/CVE-2022-37967" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013535.html" source="SUSE-SU"/>
    <description>
    Windows Kerberos Elevation of Privilege Vulnerability
    </description>
<advisory from="security@suse.de">
	<issued date="2023-01-03"/>
	<updated date="2023-03-18"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-37967/">CVE-2022-37967</cve>
	<bugzilla href="https://bugzilla.suse.com/1205386">SUSE bug 1205386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208347">SUSE bug 1208347</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009729960" comment="samba-client-libs-4.15.13+git.540.fab3b2a46c6-150300.3.46.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009666847" comment="samba-client-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202238023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-38023</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-38023" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38023" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-38023" ref_url="https://www.suse.com/security/cve/CVE-2022-38023" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0222-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V3YTRBE2CLOHDFXSGJQCTU4DTNHNRTBU/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013975.html" source="SUSE-SU"/>
		<reference ref_id="TID000021140" ref_url="https://www.suse.com/support/kb/doc/?id=000021140" source="SUSE-SU"/>
    <description>
    Netlogon RPC Elevation of Privilege Vulnerability
    </description>
<advisory from="security@suse.de">
	<issued date="2023-01-03"/>
	<updated date="2023-07-27"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38023/">CVE-2022-38023</cve>
	<bugzilla href="https://bugzilla.suse.com/1206504">SUSE bug 1206504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209664">SUSE bug 1209664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213694">SUSE bug 1213694</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009732693" comment="samba-client-libs-4.15.13+git.591.ab36624310c-150300.3.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009666847" comment="samba-client-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202238090" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-38090</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-38090" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38090" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-38090" ref_url="https://www.suse.com/security/cve/CVE-2022-38090" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0568-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013926.html" source="SUSE-SU"/>
    <description>
    Improper isolation of shared resources in some Intel(R) Processors when using Intel(R) Software Guard Extensions may allow a privileged user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-01"/>
	<updated date="2023-03-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-38090/">CVE-2022-38090</cve>
	<bugzilla href="https://bugzilla.suse.com/1208275">SUSE bug 1208275</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009739934" comment="ucode-intel-20230214-150200.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009169251" comment="ucode-intel is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202238096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-38096</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-38096" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38096" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-38096" ref_url="https://www.suse.com/security/cve/CVE-2022-38096" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0767-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference vulnerability was found in vmwgfx driver in drivers/gpu/vmxgfx/vmxgfx_execbuf.c in GPU component of Linux kernel with device file '/dev/dri/renderD128 (or Dxxx)'. This flaw allows a local attacker with a user account on the system to gain privilege, causing a denial of service(DoS).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-17"/>
	<updated date="2023-07-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-38096/">CVE-2022-38096</cve>
	<bugzilla href="https://bugzilla.suse.com/1203331">SUSE bug 1203331</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744746" comment="kernel-default-5.3.18-150300.59.115.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744747" comment="kernel-default-base-5.3.18-150300.59.115.2.150300.18.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009745026" comment="kernel-rt-5.3.18-150300.121.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223821" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3821</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3821" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3821" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3821" ref_url="https://www.suse.com/security/cve/CVE-2022-3821" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:3015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3999-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7UQBLKONTL3NZED3YWCSO3BCXRPP3DW/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014389.html" source="SUSE-SU"/>
    <description>
    An off-by-one Error issue was discovered in Systemd in format_timespan() function of time-util.c. An attacker could supply specific values for time and accuracy that leads to buffer overrun in format_timespan(), leading to a Denial of Service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-18"/>
	<updated date="2023-04-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3821/">CVE-2022-3821</cve>
	<bugzilla href="https://bugzilla.suse.com/1204968">SUSE bug 1204968</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009723306" comment="libsystemd0-246.16-150300.7.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154102" comment="libsystemd0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009723307" comment="libudev1-246.16-150300.7.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151691" comment="libudev1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009723308" comment="systemd-246.16-150300.7.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151693" comment="systemd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009723309" comment="systemd-container-246.16-150300.7.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239132" comment="systemd-container is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009723310" comment="systemd-journal-remote-246.16-150300.7.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009625973" comment="systemd-journal-remote is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009723311" comment="systemd-sysvinit-246.16-150300.7.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151697" comment="systemd-sysvinit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009723312" comment="udev-246.16-150300.7.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151699" comment="udev is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223854" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3854</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3854" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3854" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3854" ref_url="https://www.suse.com/security/cve/CVE-2022-3854" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1580-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1581-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1581-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1584-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028377.html" source="SUSE-SU"/>
    <description>
    A flaw was found in Ceph, relating to the URL processing on RGW backends. An attacker can exploit the URL processing by providing a null URL to crash the RGW, causing a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-28"/>
	<updated date="2023-05-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3854/">CVE-2022-3854</cve>
	<bugzilla href="https://bugzilla.suse.com/1205025">SUSE bug 1205025</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009750861" comment="librados2-16.2.11.58+g38d6afd3b78-150300.5.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154240" comment="librados2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009750862" comment="librbd1-16.2.11.58+g38d6afd3b78-150300.5.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154244" comment="librbd1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3903</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3903" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3903" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3903" ref_url="https://www.suse.com/security/cve/CVE-2022-3903" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
    <description>
    An incorrect read request flaw was found in the Infrared Transceiver USB driver in the Linux kernel. This issue occurs when a user attaches a malicious USB device. A local user could use this flaw to starve the resources, causing denial of service or potentially crashing the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-12-24"/>
	<updated date="2023-06-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3903/">CVE-2022-3903</cve>
	<bugzilla href="https://bugzilla.suse.com/1205220">SUSE bug 1205220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212297">SUSE bug 1212297</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009729181" comment="kernel-default-5.3.18-150300.59.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009729182" comment="kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009729347" comment="kernel-rt-5.3.18-150300.112.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202239188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-39188</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-39188" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-39188" ref_url="https://www.suse.com/security/cve/CVE-2022-39188" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012349.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012348.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3409-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3432-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in include/asm-generic/tlb.h in the Linux kernel before 5.19. Because of a race condition (unmap_mapping_range versus munmap), a device driver can free a page while it still has stale TLB entries. This only occurs in situations with VM_PFNMAP VMAs.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-15"/>
	<updated date="2023-07-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-39188/">CVE-2022-39188</cve>
	<bugzilla href="https://bugzilla.suse.com/1203107">SUSE bug 1203107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203116">SUSE bug 1203116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205313">SUSE bug 1205313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209225">SUSE bug 1209225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212326">SUSE bug 1212326</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009711223" comment="kernel-default-5.3.18-150300.59.93.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009711224" comment="kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721582" comment="kernel-rt-5.3.18-150300.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202239189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-39189</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-39189" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-39189" ref_url="https://www.suse.com/security/cve/CVE-2022-39189" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    An issue was discovered the x86 KVM subsystem in the Linux kernel before 5.18.17. Unprivileged guest users can compromise the guest kernel because TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED situations.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-13"/>
	<updated date="2023-03-30"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-39189/">CVE-2022-39189</cve>
	<bugzilla href="https://bugzilla.suse.com/1203066">SUSE bug 1203066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203067">SUSE bug 1203067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209225">SUSE bug 1209225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724521" comment="kernel-default-5.3.18-150300.59.101.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724522" comment="kernel-default-base-5.3.18-150300.59.101.1.150300.18.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724435" comment="kernel-rt-5.3.18-150300.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202239190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-39190</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-39190" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39190" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-39190" ref_url="https://www.suse.com/security/cve/CVE-2022-39190" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in net/netfilter/nf_tables_api.c in the Linux kernel before 5.19.6. A denial of service can occur upon binding to an already bound chain.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-15"/>
	<updated date="2022-12-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-39190/">CVE-2022-39190</cve>
	<bugzilla href="https://bugzilla.suse.com/1203117">SUSE bug 1203117</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009711223" comment="kernel-default-5.3.18-150300.59.93.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009711224" comment="kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721582" comment="kernel-rt-5.3.18-150300.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3970</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3970" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3970" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3970" ref_url="https://www.suse.com/security/cve/CVE-2022-3970" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013135.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in LibTIFF. It has been classified as critical. This affects the function TIFFReadRGBATileExt of the file libtiff/tif_getimage.c. The manipulation leads to integer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 227500897dfb07fb7d27f7aa570050e62617e3be. It is recommended to apply a patch to fix this issue. The identifier VDB-213549 was assigned to this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-29"/>
	<updated date="2023-03-16"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3970/">CVE-2022-3970</cve>
	<bugzilla href="https://bugzilla.suse.com/1205392">SUSE bug 1205392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208311">SUSE bug 1208311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208312">SUSE bug 1208312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208338">SUSE bug 1208338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208655">SUSE bug 1208655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209328">SUSE bug 1209328</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009725556" comment="libtiff5-4.0.9-150000.45.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202240303" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-40303</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-40303" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40303" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-40303" ref_url="https://www.suse.com/security/cve/CVE-2022-40303" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2654-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2833-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/025986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2834-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/025987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2836-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/025989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2838-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/025990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2839-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/025991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2840-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/025992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012813.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in libxml2 before 2.10.3. When parsing a multi-gigabyte XML document with the XML_PARSE_HUGE parser option enabled, several integer counters can overflow. This results in an attempt to access an array at a negative 2GB offset, typically leading to a segmentation fault.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-05"/>
	<updated date="2023-04-29"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-40303/">CVE-2022-40303</cve>
	<bugzilla href="https://bugzilla.suse.com/1204366">SUSE bug 1204366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204807">SUSE bug 1204807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205549">SUSE bug 1205549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206241">SUSE bug 1206241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206248">SUSE bug 1206248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009718902" comment="libxml2-2-2.9.7-150000.3.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151137" comment="libxml2-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009718905" comment="libxml2-tools-2.9.7-150000.3.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151140" comment="libxml2-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009718907" comment="python3-libxml2-python-2.9.7-150000.3.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177126" comment="python3-libxml2-python is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202240304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-40304</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-40304" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40304" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-40304" ref_url="https://www.suse.com/security/cve/CVE-2022-40304" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2654-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2833-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/025986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2834-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/025987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2836-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/025989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2838-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/025990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2839-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/025991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2840-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/025992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012813.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in libxml2 before 2.10.3. Certain invalid XML entity definitions can corrupt a hash table key, potentially leading to subsequent logic errors. In one case, a double-free can be provoked.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-05"/>
	<updated date="2023-04-29"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-40304/">CVE-2022-40304</cve>
	<bugzilla href="https://bugzilla.suse.com/1204367">SUSE bug 1204367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205069">SUSE bug 1205069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205549">SUSE bug 1205549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206241">SUSE bug 1206241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206248">SUSE bug 1206248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208343">SUSE bug 1208343</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009718902" comment="libxml2-2-2.9.7-150000.3.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151137" comment="libxml2-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009718905" comment="libxml2-tools-2.9.7-150000.3.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151140" comment="libxml2-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009718907" comment="python3-libxml2-python-2.9.7-150000.3.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177126" comment="python3-libxml2-python is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202240674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-40674</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-40674" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40674" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-40674" ref_url="https://www.suse.com/security/cve/CVE-2022-40674" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012544.html" source="SUSE-SU"/>
    <description>
    libexpat before 2.4.9 has a use-after-free in the doContent function in xmlparse.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-18"/>
	<updated date="2023-04-15"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-40674/">CVE-2022-40674</cve>
	<bugzilla href="https://bugzilla.suse.com/1203438">SUSE bug 1203438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204099">SUSE bug 1204099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204177">SUSE bug 1204177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204509">SUSE bug 1204509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205077">SUSE bug 1205077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205285">SUSE bug 1205285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205527">SUSE bug 1205527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205598">SUSE bug 1205598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208339">SUSE bug 1208339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208753">SUSE bug 1208753</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009715847" comment="libexpat1-2.2.5-150000.3.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151332" comment="libexpat1 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202240768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-40768</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-40768" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40768" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-40768" ref_url="https://www.suse.com/security/cve/CVE-2022-40768" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4273-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/026621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
    <description>
    drivers/scsi/stex.c in the Linux kernel through 5.19.9 allows local users to obtain sensitive information from kernel memory because stex_queuecommand_lck lacks a memset for the PASSTHRU_CMD case.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-27"/>
	<updated date="2023-02-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-40768/">CVE-2022-40768</cve>
	<bugzilla href="https://bugzilla.suse.com/1203514">SUSE bug 1203514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721862" comment="kernel-default-5.3.18-150300.59.98.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721863" comment="kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721582" comment="kernel-rt-5.3.18-150300.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202240897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-40897</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-40897" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40897" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-40897" ref_url="https://www.suse.com/security/cve/CVE-2022-40897" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013754.html" source="SUSE-SU"/>
    <description>
    Python Packaging Authority (PyPA) setuptools before 65.5.1 allows remote attackers to cause a denial of service via HTML in a crafted package or custom PackageIndex page. There is a Regular Expression Denial of Service (ReDoS) in package_index.py.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-02"/>
	<updated date="2023-03-18"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-40897/">CVE-2022-40897</cve>
	<bugzilla href="https://bugzilla.suse.com/1206667">SUSE bug 1206667</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009731781" comment="python3-setuptools-40.5.0-150100.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303048" comment="python3-setuptools is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202240899" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-40899</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-40899" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40899" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-40899" ref_url="https://www.suse.com/security/cve/CVE-2022-40899" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013988.html" source="SUSE-SU"/>
    <description>
    An issue discovered in Python Charmers Future 0.18.2 and earlier allows remote attackers to cause a denial of service via crafted Set-Cookie header from malicious web server.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-01-13"/>
	<updated date="2023-03-10"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-40899/">CVE-2022-40899</cve>
	<bugzilla href="https://bugzilla.suse.com/1206673">SUSE bug 1206673</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009731088" comment="python3-future-0.18.2-150300.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009732024" comment="python3-future is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20224095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-4095</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-4095" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4095" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-4095" ref_url="https://www.suse.com/security/cve/CVE-2022-4095" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in Linux kernel before 5.19.2. This issue occurs in cmd_hdl_filter in drivers/staging/rtl8712/rtl8712_cmd.c, allowing an attacker to launch a local denial of service attack and gain escalation of privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-12-24"/>
	<updated date="2023-06-14"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4095/">CVE-2022-4095</cve>
	<bugzilla href="https://bugzilla.suse.com/1205514">SUSE bug 1205514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205594">SUSE bug 1205594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208030">SUSE bug 1208030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208085">SUSE bug 1208085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212319">SUSE bug 1212319</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009729181" comment="kernel-default-5.3.18-150300.59.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009729182" comment="kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009729347" comment="kernel-rt-5.3.18-150300.112.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202241218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-41218</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-41218" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-41218" ref_url="https://www.suse.com/security/cve/CVE-2022-41218" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4569-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-December/026938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
    <description>
    In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-27"/>
	<updated date="2023-03-30"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41218/">CVE-2022-41218</cve>
	<bugzilla href="https://bugzilla.suse.com/1202960">SUSE bug 1202960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203606">SUSE bug 1203606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205313">SUSE bug 1205313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209225">SUSE bug 1209225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
</definition>
<definition id="oval:org.opensuse.security:def:202241222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-41222</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-41222" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41222" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-41222" ref_url="https://www.suse.com/security/cve/CVE-2022-41222" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012771.html" source="SUSE-SU"/>
    <description>
    mm/mremap.c in the Linux kernel before 5.13.3 has a use-after-free via a stale TLB because an rmap lock is not held during a PUD move.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-27"/>
	<updated date="2023-03-30"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41222/">CVE-2022-41222</cve>
	<bugzilla href="https://bugzilla.suse.com/1203622">SUSE bug 1203622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203624">SUSE bug 1203624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209225">SUSE bug 1209225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209476">SUSE bug 1209476</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721862" comment="kernel-default-5.3.18-150300.59.98.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721863" comment="kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721582" comment="kernel-rt-5.3.18-150300.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20224129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-4129</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-4129" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4129" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-4129" ref_url="https://www.suse.com/security/cve/CVE-2022-4129" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014114.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's Layer 2 Tunneling Protocol (L2TP). A missing lock when clearing sk_user_data can lead to a race condition and NULL pointer dereference. A local user could use this flaw to potentially crash the system causing a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-12-24"/>
	<updated date="2023-03-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4129/">CVE-2022-4129</cve>
	<bugzilla href="https://bugzilla.suse.com/1205711">SUSE bug 1205711</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009729181" comment="kernel-default-5.3.18-150300.59.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009729182" comment="kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009729347" comment="kernel-rt-5.3.18-150300.112.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20224139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-4139</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-4139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4139" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-4139" ref_url="https://www.suse.com/security/cve/CVE-2022-4139" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4560-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-December/026940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4569-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-December/026938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    An incorrect TLB flush issue was found in the Linux kernel’s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-12-24"/>
	<updated date="2023-03-30"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4139/">CVE-2022-4139</cve>
	<bugzilla href="https://bugzilla.suse.com/1205700">SUSE bug 1205700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205815">SUSE bug 1205815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209225">SUSE bug 1209225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009729181" comment="kernel-default-5.3.18-150300.59.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009729182" comment="kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009729347" comment="kernel-rt-5.3.18-150300.112.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20224141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-4141</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-4141" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4141" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-4141" ref_url="https://www.suse.com/security/cve/CVE-2022-4141" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:3493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013598.html" source="SUSE-SU"/>
    <description>
    Heap based buffer overflow in vim/vim 9.0.0946 and below by allowing an attacker to CTRL-W gf in the expression used in the RHS of the substitute command.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-12-29"/>
	<updated date="2023-03-31"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4141/">CVE-2022-4141</cve>
	<bugzilla href="https://bugzilla.suse.com/1205797">SUSE bug 1205797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208649">SUSE bug 1208649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208651">SUSE bug 1208651</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009729554" comment="vim-data-common-9.0.1040-150000.5.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009729641" comment="vim-small-9.0.1040-150000.5.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20224144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-4144</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-4144" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4144" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-4144" ref_url="https://www.suse.com/security/cve/CVE-2022-4144" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014146.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read flaw was found in the QXL display device emulation in QEMU. The qxl_phys2virt() function does not check the size of the structure pointed to by the guest physical address, potentially reading past the end of the bar space into adjacent pages. A malicious guest user could use this flaw to crash the QEMU process on the host causing a denial of service condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-21"/>
	<updated date="2023-03-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4144/">CVE-2022-4144</cve>
	<bugzilla href="https://bugzilla.suse.com/1205808">SUSE bug 1205808</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744216" comment="qemu-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744217" comment="qemu-arm-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744220" comment="qemu-audio-spice-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623393" comment="qemu-audio-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744226" comment="qemu-chardev-spice-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623395" comment="qemu-chardev-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744227" comment="qemu-guest-agent-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744228" comment="qemu-hw-display-qxl-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623396" comment="qemu-hw-display-qxl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744488" comment="qemu-hw-display-virtio-gpu-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623397" comment="qemu-hw-display-virtio-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744231" comment="qemu-hw-display-virtio-vga-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623399" comment="qemu-hw-display-virtio-vga is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744232" comment="qemu-hw-usb-redirect-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623401" comment="qemu-hw-usb-redirect is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744233" comment="qemu-ipxe-1.0.0+-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744237" comment="qemu-seabios-1.14.0_0_g155821a-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744238" comment="qemu-sgabios-8-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744239" comment="qemu-tools-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744242" comment="qemu-ui-opengl-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623406" comment="qemu-ui-opengl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744244" comment="qemu-ui-spice-core-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623407" comment="qemu-ui-spice-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744245" comment="qemu-vgabios-1.14.0_0_g155821a-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744246" comment="qemu-x86-5.2.0-150300.121.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202241674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-41674</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-41674" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-41674" ref_url="https://www.suse.com/security/cve/CVE-2022-41674" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.19.16. Attackers able to inject WLAN frames could cause a buffer overflow in the ieee80211_bss_info_update function in net/mac80211/scan.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-27"/>
	<updated date="2023-03-30"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41674/">CVE-2022-41674</cve>
	<bugzilla href="https://bugzilla.suse.com/1203770">SUSE bug 1203770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203994">SUSE bug 1203994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209225">SUSE bug 1209225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721862" comment="kernel-default-5.3.18-150300.59.98.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721863" comment="kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721582" comment="kernel-rt-5.3.18-150300.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202241848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-41848</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-41848" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41848" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-41848" ref_url="https://www.suse.com/security/cve/CVE-2022-41848" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
    <description>
    drivers/char/pcmcia/synclink_cs.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling ioctl, aka a race condition between mgslpc_ioctl and mgslpc_detach.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-27"/>
	<updated date="2023-06-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41848/">CVE-2022-41848</cve>
	<bugzilla href="https://bugzilla.suse.com/1203987">SUSE bug 1203987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211484">SUSE bug 1211484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212317">SUSE bug 1212317</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721862" comment="kernel-default-5.3.18-150300.59.98.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721863" comment="kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721582" comment="kernel-rt-5.3.18-150300.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202241849" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-41849</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-41849" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41849" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-41849" ref_url="https://www.suse.com/security/cve/CVE-2022-41849" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    drivers/video/fbdev/smscufx.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free if a physically proximate attacker removes a USB device while calling open(), aka a race condition between ufx_ops_open and ufx_usb_disconnect.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-27"/>
	<updated date="2022-12-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41849/">CVE-2022-41849</cve>
	<bugzilla href="https://bugzilla.suse.com/1203992">SUSE bug 1203992</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721862" comment="kernel-default-5.3.18-150300.59.98.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721863" comment="kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721582" comment="kernel-rt-5.3.18-150300.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202241850" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-41850</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-41850" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41850" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-41850" ref_url="https://www.suse.com/security/cve/CVE-2022-41850" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
    <description>
    roccat_report_event in drivers/hid/hid-roccat.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free in certain situations where a report is received while copying a report-&gt;value is in progress.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-12-24"/>
	<updated date="2023-06-14"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-41850/">CVE-2022-41850</cve>
	<bugzilla href="https://bugzilla.suse.com/1203960">SUSE bug 1203960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212314">SUSE bug 1212314</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009729181" comment="kernel-default-5.3.18-150300.59.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009729182" comment="kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009729347" comment="kernel-rt-5.3.18-150300.112.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202241858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-41858</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-41858" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41858" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-41858" ref_url="https://www.suse.com/security/cve/CVE-2022-41858" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel. A NULL pointer dereference may occur while a slip driver is in progress to detach in sl_tx_timeout in drivers/net/slip/slip.c. This issue could allow an attacker to crash the system or leak internal kernel information.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-12-24"/>
	<updated date="2023-06-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41858/">CVE-2022-41858</cve>
	<bugzilla href="https://bugzilla.suse.com/1205671">SUSE bug 1205671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211484">SUSE bug 1211484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212300">SUSE bug 1212300</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009729181" comment="kernel-default-5.3.18-150300.59.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009729182" comment="kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009729347" comment="kernel-rt-5.3.18-150300.112.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202241973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-41973</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-41973" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41973" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-41973" ref_url="https://www.suse.com/security/cve/CVE-2022-41973" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012644.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012643.html" source="SUSE-SU"/>
    <description>
    multipath-tools 0.7.7 through 0.9.x before 0.9.2 allows local users to obtain root access, as exploited in conjunction with CVE-2022-41974. Local users able to access /dev/shm can change symlinks in multipathd due to incorrect symlink handling, which could lead to controlled file writes outside of the /dev/shm directory. This could be used indirectly for local privilege escalation to root.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-25"/>
	<updated date="2023-03-31"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-41973/">CVE-2022-41973</cve>
	<bugzilla href="https://bugzilla.suse.com/1202739">SUSE bug 1202739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209929">SUSE bug 1209929</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009720775" comment="kpartx-0.8.5+126+suse.8ce8da5-150300.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009720096" comment="kpartx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009720776" comment="libmpath0-0.8.5+126+suse.8ce8da5-150300.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009720099" comment="libmpath0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009720777" comment="multipath-tools-0.8.5+126+suse.8ce8da5-150300.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009720100" comment="multipath-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202241974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-41974</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-41974" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41974" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-41974" ref_url="https://www.suse.com/security/cve/CVE-2022-41974" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012644.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012645.html" source="SUSE-SU"/>
    <description>
    multipath-tools 0.7.0 through 0.9.x before 0.9.2 allows local users to obtain root access, as exploited alone or in conjunction with CVE-2022-41973. Local users able to write to UNIX domain sockets can bypass access controls and manipulate the multipath setup. This can lead to local privilege escalation to root. This occurs because an attacker can repeat a keyword, which is mishandled because arithmetic ADD is used instead of bitwise OR.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-25"/>
	<updated date="2022-11-17"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41974/">CVE-2022-41974</cve>
	<bugzilla href="https://bugzilla.suse.com/1205472">SUSE bug 1205472</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009720775" comment="kpartx-0.8.5+126+suse.8ce8da5-150300.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009720096" comment="kpartx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009720776" comment="libmpath0-0.8.5+126+suse.8ce8da5-150300.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009720099" comment="libmpath0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009720777" comment="multipath-tools-0.8.5+126+suse.8ce8da5-150300.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009720100" comment="multipath-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42010</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42010" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42010" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42010" ref_url="https://www.suse.com/security/cve/CVE-2022-42010" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013162.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in D-Bus before 1.12.24, 1.13.x and 1.14.x before 1.14.4, and 1.15.x before 1.15.2. An authenticated attacker can cause dbus-daemon and other programs that use libdbus to crash when receiving a message with certain invalid type signatures.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-28"/>
	<updated date="2023-04-15"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-42010/">CVE-2022-42010</cve>
	<bugzilla href="https://bugzilla.suse.com/1204111">SUSE bug 1204111</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009717556" comment="dbus-1-1.12.2-150100.8.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151535" comment="dbus-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009717558" comment="dbus-1-x11-1.12.2-150100.8.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151537" comment="dbus-1-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009717559" comment="libdbus-1-3-1.12.2-150100.8.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151538" comment="libdbus-1-3 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242011" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42011</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42011" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42011" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42011" ref_url="https://www.suse.com/security/cve/CVE-2022-42011" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013162.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in D-Bus before 1.12.24, 1.13.x and 1.14.x before 1.14.4, and 1.15.x before 1.15.2. An authenticated attacker can cause dbus-daemon and other programs that use libdbus to crash when receiving a message where an array length is inconsistent with the size of the element type.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-28"/>
	<updated date="2023-04-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-42011/">CVE-2022-42011</cve>
	<bugzilla href="https://bugzilla.suse.com/1204112">SUSE bug 1204112</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009717556" comment="dbus-1-1.12.2-150100.8.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151535" comment="dbus-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009717558" comment="dbus-1-x11-1.12.2-150100.8.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151537" comment="dbus-1-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009717559" comment="libdbus-1-3-1.12.2-150100.8.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151538" comment="libdbus-1-3 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42012</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42012" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42012" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42012" ref_url="https://www.suse.com/security/cve/CVE-2022-42012" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013162.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in D-Bus before 1.12.24, 1.13.x and 1.14.x before 1.14.4, and 1.15.x before 1.15.2. An authenticated attacker can cause dbus-daemon and other programs that use libdbus to crash by sending a message with attached file descriptors in an unexpected format.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-28"/>
	<updated date="2023-04-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-42012/">CVE-2022-42012</cve>
	<bugzilla href="https://bugzilla.suse.com/1204113">SUSE bug 1204113</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009717556" comment="dbus-1-1.12.2-150100.8.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151535" comment="dbus-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009717558" comment="dbus-1-x11-1.12.2-150100.8.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151537" comment="dbus-1-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009717559" comment="libdbus-1-3-1.12.2-150100.8.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151538" comment="libdbus-1-3 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242309" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42309</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42309" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42309" ref_url="https://www.suse.com/security/cve/CVE-2022-42309" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013191.html" source="SUSE-SU"/>
    <description>
    Xenstore: Guests can crash xenstored Due to a bug in the fix of XSA-115 a malicious guest can cause xenstored to use a wrong pointer during node creation in an error path, resulting in a crash of xenstored or a memory corruption in xenstored causing further damage. Entering the error path can be controlled by the guest e.g. by exceeding the quota value of maximum nodes per domain.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-13"/>
	<updated date="2023-01-17"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42309/">CVE-2022-42309</cve>
	<bugzilla href="https://bugzilla.suse.com/1204485">SUSE bug 1204485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724870" comment="xen-libs-4.14.5_08-150300.3.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242310" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42310</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42310" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42310" ref_url="https://www.suse.com/security/cve/CVE-2022-42310" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013191.html" source="SUSE-SU"/>
    <description>
    Xenstore: Guests can create orphaned Xenstore nodes By creating multiple nodes inside a transaction resulting in an error, a malicious guest can create orphaned nodes in the Xenstore data base, as the cleanup after the error will not remove all nodes already created. When the transaction is committed after this situation, nodes without a valid parent can be made permanent in the data base.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-13"/>
	<updated date="2022-12-21"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42310/">CVE-2022-42310</cve>
	<bugzilla href="https://bugzilla.suse.com/1204487">SUSE bug 1204487</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724870" comment="xen-libs-4.14.5_08-150300.3.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42311</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42311" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42311" ref_url="https://www.suse.com/security/cve/CVE-2022-42311" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013191.html" source="SUSE-SU"/>
    <description>
    Xenstore: guests can let run xenstored out of memory T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Malicious guests can cause xenstored to allocate vast amounts of memory, eventually resulting in a Denial of Service (DoS) of xenstored. There are multiple ways how guests can cause large memory allocations in xenstored: - - by issuing new requests to xenstored without reading the responses, causing the responses to be buffered in memory - - by causing large number of watch events to be generated via setting up multiple xenstore watches and then e.g. deleting many xenstore nodes below the watched path - - by creating as many nodes as allowed with the maximum allowed size and path length in as many transactions as possible - - by accessing many nodes inside a transaction
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-13"/>
	<updated date="2022-12-21"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42311/">CVE-2022-42311</cve>
	<bugzilla href="https://bugzilla.suse.com/1204482">SUSE bug 1204482</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724870" comment="xen-libs-4.14.5_08-150300.3.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242312" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42312</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42312" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42312" ref_url="https://www.suse.com/security/cve/CVE-2022-42312" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013191.html" source="SUSE-SU"/>
    <description>
    Xenstore: guests can let run xenstored out of memory T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Malicious guests can cause xenstored to allocate vast amounts of memory, eventually resulting in a Denial of Service (DoS) of xenstored. There are multiple ways how guests can cause large memory allocations in xenstored: - - by issuing new requests to xenstored without reading the responses, causing the responses to be buffered in memory - - by causing large number of watch events to be generated via setting up multiple xenstore watches and then e.g. deleting many xenstore nodes below the watched path - - by creating as many nodes as allowed with the maximum allowed size and path length in as many transactions as possible - - by accessing many nodes inside a transaction
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-13"/>
	<updated date="2022-12-21"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42312/">CVE-2022-42312</cve>
	<bugzilla href="https://bugzilla.suse.com/1204482">SUSE bug 1204482</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724870" comment="xen-libs-4.14.5_08-150300.3.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42313</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42313" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42313" ref_url="https://www.suse.com/security/cve/CVE-2022-42313" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013191.html" source="SUSE-SU"/>
    <description>
    Xenstore: guests can let run xenstored out of memory T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Malicious guests can cause xenstored to allocate vast amounts of memory, eventually resulting in a Denial of Service (DoS) of xenstored. There are multiple ways how guests can cause large memory allocations in xenstored: - - by issuing new requests to xenstored without reading the responses, causing the responses to be buffered in memory - - by causing large number of watch events to be generated via setting up multiple xenstore watches and then e.g. deleting many xenstore nodes below the watched path - - by creating as many nodes as allowed with the maximum allowed size and path length in as many transactions as possible - - by accessing many nodes inside a transaction
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-13"/>
	<updated date="2022-12-21"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42313/">CVE-2022-42313</cve>
	<bugzilla href="https://bugzilla.suse.com/1204482">SUSE bug 1204482</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724870" comment="xen-libs-4.14.5_08-150300.3.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242314" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42314</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42314" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42314" ref_url="https://www.suse.com/security/cve/CVE-2022-42314" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013191.html" source="SUSE-SU"/>
    <description>
    Xenstore: guests can let run xenstored out of memory T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Malicious guests can cause xenstored to allocate vast amounts of memory, eventually resulting in a Denial of Service (DoS) of xenstored. There are multiple ways how guests can cause large memory allocations in xenstored: - - by issuing new requests to xenstored without reading the responses, causing the responses to be buffered in memory - - by causing large number of watch events to be generated via setting up multiple xenstore watches and then e.g. deleting many xenstore nodes below the watched path - - by creating as many nodes as allowed with the maximum allowed size and path length in as many transactions as possible - - by accessing many nodes inside a transaction
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-13"/>
	<updated date="2022-12-21"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42314/">CVE-2022-42314</cve>
	<bugzilla href="https://bugzilla.suse.com/1204482">SUSE bug 1204482</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724870" comment="xen-libs-4.14.5_08-150300.3.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242315" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42315</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42315" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42315" ref_url="https://www.suse.com/security/cve/CVE-2022-42315" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013191.html" source="SUSE-SU"/>
    <description>
    Xenstore: guests can let run xenstored out of memory T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Malicious guests can cause xenstored to allocate vast amounts of memory, eventually resulting in a Denial of Service (DoS) of xenstored. There are multiple ways how guests can cause large memory allocations in xenstored: - - by issuing new requests to xenstored without reading the responses, causing the responses to be buffered in memory - - by causing large number of watch events to be generated via setting up multiple xenstore watches and then e.g. deleting many xenstore nodes below the watched path - - by creating as many nodes as allowed with the maximum allowed size and path length in as many transactions as possible - - by accessing many nodes inside a transaction
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-13"/>
	<updated date="2022-12-21"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42315/">CVE-2022-42315</cve>
	<bugzilla href="https://bugzilla.suse.com/1204482">SUSE bug 1204482</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724870" comment="xen-libs-4.14.5_08-150300.3.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242316" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42316</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42316" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42316" ref_url="https://www.suse.com/security/cve/CVE-2022-42316" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013191.html" source="SUSE-SU"/>
    <description>
    Xenstore: guests can let run xenstored out of memory T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Malicious guests can cause xenstored to allocate vast amounts of memory, eventually resulting in a Denial of Service (DoS) of xenstored. There are multiple ways how guests can cause large memory allocations in xenstored: - - by issuing new requests to xenstored without reading the responses, causing the responses to be buffered in memory - - by causing large number of watch events to be generated via setting up multiple xenstore watches and then e.g. deleting many xenstore nodes below the watched path - - by creating as many nodes as allowed with the maximum allowed size and path length in as many transactions as possible - - by accessing many nodes inside a transaction
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-13"/>
	<updated date="2022-12-21"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42316/">CVE-2022-42316</cve>
	<bugzilla href="https://bugzilla.suse.com/1204482">SUSE bug 1204482</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724870" comment="xen-libs-4.14.5_08-150300.3.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242317" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42317</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42317" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42317" ref_url="https://www.suse.com/security/cve/CVE-2022-42317" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013191.html" source="SUSE-SU"/>
    <description>
    Xenstore: guests can let run xenstored out of memory T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Malicious guests can cause xenstored to allocate vast amounts of memory, eventually resulting in a Denial of Service (DoS) of xenstored. There are multiple ways how guests can cause large memory allocations in xenstored: - - by issuing new requests to xenstored without reading the responses, causing the responses to be buffered in memory - - by causing large number of watch events to be generated via setting up multiple xenstore watches and then e.g. deleting many xenstore nodes below the watched path - - by creating as many nodes as allowed with the maximum allowed size and path length in as many transactions as possible - - by accessing many nodes inside a transaction
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-13"/>
	<updated date="2022-12-21"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42317/">CVE-2022-42317</cve>
	<bugzilla href="https://bugzilla.suse.com/1204482">SUSE bug 1204482</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724870" comment="xen-libs-4.14.5_08-150300.3.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242318" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42318</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42318" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42318" ref_url="https://www.suse.com/security/cve/CVE-2022-42318" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013191.html" source="SUSE-SU"/>
    <description>
    Xenstore: guests can let run xenstored out of memory T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Malicious guests can cause xenstored to allocate vast amounts of memory, eventually resulting in a Denial of Service (DoS) of xenstored. There are multiple ways how guests can cause large memory allocations in xenstored: - - by issuing new requests to xenstored without reading the responses, causing the responses to be buffered in memory - - by causing large number of watch events to be generated via setting up multiple xenstore watches and then e.g. deleting many xenstore nodes below the watched path - - by creating as many nodes as allowed with the maximum allowed size and path length in as many transactions as possible - - by accessing many nodes inside a transaction
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-13"/>
	<updated date="2022-12-21"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42318/">CVE-2022-42318</cve>
	<bugzilla href="https://bugzilla.suse.com/1204482">SUSE bug 1204482</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724870" comment="xen-libs-4.14.5_08-150300.3.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242319" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42319</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42319" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42319" ref_url="https://www.suse.com/security/cve/CVE-2022-42319" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013191.html" source="SUSE-SU"/>
    <description>
    Xenstore: Guests can cause Xenstore to not free temporary memory When working on a request of a guest, xenstored might need to allocate quite large amounts of memory temporarily. This memory is freed only after the request has been finished completely. A request is regarded to be finished only after the guest has read the response message of the request from the ring page. Thus a guest not reading the response can cause xenstored to not free the temporary memory. This can result in memory shortages causing Denial of Service (DoS) of xenstored.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-13"/>
	<updated date="2022-12-21"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42319/">CVE-2022-42319</cve>
	<bugzilla href="https://bugzilla.suse.com/1204488">SUSE bug 1204488</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724870" comment="xen-libs-4.14.5_08-150300.3.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242320" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42320</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42320" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42320" ref_url="https://www.suse.com/security/cve/CVE-2022-42320" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013191.html" source="SUSE-SU"/>
    <description>
    Xenstore: Guests can get access to Xenstore nodes of deleted domains Access rights of Xenstore nodes are per domid. When a domain is gone, there might be Xenstore nodes left with access rights containing the domid of the removed domain. This is normally no problem, as those access right entries will be corrected when such a node is written later. There is a small time window when a new domain is created, where the access rights of a past domain with the same domid as the new one will be regarded to be still valid, leading to the new domain being able to get access to a node which was meant to be accessible by the removed domain. For this to happen another domain needs to write the node before the newly created domain is being introduced to Xenstore by dom0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-13"/>
	<updated date="2022-12-21"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42320/">CVE-2022-42320</cve>
	<bugzilla href="https://bugzilla.suse.com/1204489">SUSE bug 1204489</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724870" comment="xen-libs-4.14.5_08-150300.3.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242321" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42321</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42321" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42321" ref_url="https://www.suse.com/security/cve/CVE-2022-42321" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013191.html" source="SUSE-SU"/>
    <description>
    Xenstore: Guests can crash xenstored via exhausting the stack Xenstored is using recursion for some Xenstore operations (e.g. for deleting a sub-tree of Xenstore nodes). With sufficiently deep nesting levels this can result in stack exhaustion on xenstored, leading to a crash of xenstored.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-13"/>
	<updated date="2022-12-21"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42321/">CVE-2022-42321</cve>
	<bugzilla href="https://bugzilla.suse.com/1204490">SUSE bug 1204490</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724870" comment="xen-libs-4.14.5_08-150300.3.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42322</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42322" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42322" ref_url="https://www.suse.com/security/cve/CVE-2022-42322" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013191.html" source="SUSE-SU"/>
    <description>
    Xenstore: Cooperating guests can create arbitrary numbers of nodes T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Since the fix of XSA-322 any Xenstore node owned by a removed domain will be modified to be owned by Dom0. This will allow two malicious guests working together to create an arbitrary number of Xenstore nodes. This is possible by domain A letting domain B write into domain A's local Xenstore tree. Domain B can then create many nodes and reboot. The nodes created by domain B will now be owned by Dom0. By repeating this process over and over again an arbitrary number of nodes can be created, as Dom0's number of nodes isn't limited by Xenstore quota.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-13"/>
	<updated date="2022-12-21"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42322/">CVE-2022-42322</cve>
	<bugzilla href="https://bugzilla.suse.com/1204494">SUSE bug 1204494</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724870" comment="xen-libs-4.14.5_08-150300.3.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242323" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42323</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42323" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42323" ref_url="https://www.suse.com/security/cve/CVE-2022-42323" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013191.html" source="SUSE-SU"/>
    <description>
    Xenstore: Cooperating guests can create arbitrary numbers of nodes T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Since the fix of XSA-322 any Xenstore node owned by a removed domain will be modified to be owned by Dom0. This will allow two malicious guests working together to create an arbitrary number of Xenstore nodes. This is possible by domain A letting domain B write into domain A's local Xenstore tree. Domain B can then create many nodes and reboot. The nodes created by domain B will now be owned by Dom0. By repeating this process over and over again an arbitrary number of nodes can be created, as Dom0's number of nodes isn't limited by Xenstore quota.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-13"/>
	<updated date="2022-12-21"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42323/">CVE-2022-42323</cve>
	<bugzilla href="https://bugzilla.suse.com/1204494">SUSE bug 1204494</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724870" comment="xen-libs-4.14.5_08-150300.3.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242325" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42325</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42325" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42325" ref_url="https://www.suse.com/security/cve/CVE-2022-42325" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013191.html" source="SUSE-SU"/>
    <description>
    Xenstore: Guests can create arbitrary number of nodes via transactions T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] In case a node has been created in a transaction and it is later deleted in the same transaction, the transaction will be terminated with an error. As this error is encountered only when handling the deleted node at transaction finalization, the transaction will have been performed partially and without updating the accounting information. This will enable a malicious guest to create arbitrary number of nodes.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-13"/>
	<updated date="2022-12-21"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42325/">CVE-2022-42325</cve>
	<bugzilla href="https://bugzilla.suse.com/1204496">SUSE bug 1204496</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724870" comment="xen-libs-4.14.5_08-150300.3.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242326" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42326</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42326" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42326" ref_url="https://www.suse.com/security/cve/CVE-2022-42326" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013191.html" source="SUSE-SU"/>
    <description>
    Xenstore: Guests can create arbitrary number of nodes via transactions T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] In case a node has been created in a transaction and it is later deleted in the same transaction, the transaction will be terminated with an error. As this error is encountered only when handling the deleted node at transaction finalization, the transaction will have been performed partially and without updating the accounting information. This will enable a malicious guest to create arbitrary number of nodes.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-13"/>
	<updated date="2022-12-21"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42326/">CVE-2022-42326</cve>
	<bugzilla href="https://bugzilla.suse.com/1204496">SUSE bug 1204496</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724870" comment="xen-libs-4.14.5_08-150300.3.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242328" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42328</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42328" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42328" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42328" ref_url="https://www.suse.com/security/cve/CVE-2022-42328" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013757.html" source="SUSE-SU"/>
    <description>
    Guests can trigger deadlock in Linux netback driver T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] The patch for XSA-392 introduced another issue which might result in a deadlock when trying to free the SKB of a packet dropped due to the XSA-392 handling (CVE-2022-42328). Additionally when dropping packages for other reasons the same deadlock could occur in case of netpoll being active for the interface the xen-netback driver is connected to (CVE-2022-42329).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-01-26"/>
	<updated date="2023-03-18"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42328/">CVE-2022-42328</cve>
	<bugzilla href="https://bugzilla.suse.com/1206114">SUSE bug 1206114</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009735606" comment="kernel-default-5.3.18-150300.59.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009735607" comment="kernel-default-base-5.3.18-150300.59.109.1.150300.18.62.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009734769" comment="kernel-rt-5.3.18-150300.115.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242329" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42329</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42329" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42329" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42329" ref_url="https://www.suse.com/security/cve/CVE-2022-42329" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013757.html" source="SUSE-SU"/>
    <description>
    Guests can trigger deadlock in Linux netback driver T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] The patch for XSA-392 introduced another issue which might result in a deadlock when trying to free the SKB of a packet dropped due to the XSA-392 handling (CVE-2022-42328). Additionally when dropping packages for other reasons the same deadlock could occur in case of netpoll being active for the interface the xen-netback driver is connected to (CVE-2022-42329).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-01-26"/>
	<updated date="2023-03-18"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42329/">CVE-2022-42329</cve>
	<bugzilla href="https://bugzilla.suse.com/1206114">SUSE bug 1206114</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009735606" comment="kernel-default-5.3.18-150300.59.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009735607" comment="kernel-default-base-5.3.18-150300.59.109.1.150300.18.62.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009734769" comment="kernel-rt-5.3.18-150300.115.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242331" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42331</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42331" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42331" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42331" ref_url="https://www.suse.com/security/cve/CVE-2022-42331" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0848-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014116.html" source="SUSE-SU"/>
    <description>
    x86: speculative vulnerability in 32bit SYSCALL path Due to an oversight in the very original Spectre/Meltdown security work (XSA-254), one entrypath performs its speculation-safety actions too late. In some configurations, there is an unprotected RET instruction which can be attacked with a variety of speculative attacks.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-21"/>
	<updated date="2023-06-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-42331/">CVE-2022-42331</cve>
	<bugzilla href="https://bugzilla.suse.com/1209019">SUSE bug 1209019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009747859" comment="xen-libs-4.14.5_12-150300.3.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242332" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42332</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42332" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42332" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42332" ref_url="https://www.suse.com/security/cve/CVE-2022-42332" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0848-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014116.html" source="SUSE-SU"/>
    <description>
    x86 shadow plus log-dirty mode use-after-free In environments where host assisted address translation is necessary but Hardware Assisted Paging (HAP) is unavailable, Xen will run guests in so called shadow mode. Shadow mode maintains a pool of memory used for both shadow page tables as well as auxiliary data structures. To migrate or snapshot guests, Xen additionally runs them in so called log-dirty mode. The data structures needed by the log-dirty tracking are part of aformentioned auxiliary data. In order to keep error handling efforts within reasonable bounds, for operations which may require memory allocations shadow mode logic ensures up front that enough memory is available for the worst case requirements. Unfortunately, while page table memory is properly accounted for on the code path requiring the potential establishing of new shadows, demands by the log-dirty infrastructure were not taken into consideration. As a result, just established shadow page tables could be freed again immediately, while other code is still accessing them on the assumption that they would remain allocated.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-21"/>
	<updated date="2023-06-16"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42332/">CVE-2022-42332</cve>
	<bugzilla href="https://bugzilla.suse.com/1209017">SUSE bug 1209017</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009747859" comment="xen-libs-4.14.5_12-150300.3.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242333" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42333</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42333" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42333" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42333" ref_url="https://www.suse.com/security/cve/CVE-2022-42333" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0848-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014116.html" source="SUSE-SU"/>
    <description>
    x86/HVM pinned cache attributes mis-handling T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] To allow cachability control for HVM guests with passed through devices, an interface exists to explicitly override defaults which would otherwise be put in place. While not exposed to the affected guests themselves, the interface specifically exists for domains controlling such guests. This interface may therefore be used by not fully privileged entities, e.g. qemu running deprivileged in Dom0 or qemu running in a so called stub-domain. With this exposure it is an issue that - the number of the such controlled regions was unbounded (CVE-2022-42333), - installation and removal of such regions was not properly serialized (CVE-2022-42334).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-21"/>
	<updated date="2023-06-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-42333/">CVE-2022-42333</cve>
	<bugzilla href="https://bugzilla.suse.com/1209018">SUSE bug 1209018</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009747859" comment="xen-libs-4.14.5_12-150300.3.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242334" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42334</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42334" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42334" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42334" ref_url="https://www.suse.com/security/cve/CVE-2022-42334" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0848-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014116.html" source="SUSE-SU"/>
    <description>
    x86/HVM pinned cache attributes mis-handling T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] To allow cachability control for HVM guests with passed through devices, an interface exists to explicitly override defaults which would otherwise be put in place. While not exposed to the affected guests themselves, the interface specifically exists for domains controlling such guests. This interface may therefore be used by not fully privileged entities, e.g. qemu running deprivileged in Dom0 or qemu running in a so called stub-domain. With this exposure it is an issue that - the number of the such controlled regions was unbounded (CVE-2022-42333), - installation and removal of such regions was not properly serialized (CVE-2022-42334).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-21"/>
	<updated date="2023-06-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-42334/">CVE-2022-42334</cve>
	<bugzilla href="https://bugzilla.suse.com/1209018">SUSE bug 1209018</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009747859" comment="xen-libs-4.14.5_12-150300.3.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20224254" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-4254</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-4254" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4254" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-4254" ref_url="https://www.suse.com/security/cve/CVE-2022-4254" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013652.html" source="SUSE-SU"/>
    <description>
    sssd: libsss_certmap fails to sanitise certificate data used in LDAP filters
    </description>
<advisory from="security@suse.de">
	<issued date="2023-01-28"/>
	<updated date="2023-02-08"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4254/">CVE-2022-4254</cve>
	<bugzilla href="https://bugzilla.suse.com/1207474">SUSE bug 1207474</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009735623" comment="libsss_certmap0-1.16.1-150300.23.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231790" comment="libsss_certmap0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009735625" comment="libsss_idmap0-1.16.1-150300.23.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151530" comment="libsss_idmap0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009735627" comment="libsss_nss_idmap0-1.16.1-150300.23.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152072" comment="libsss_nss_idmap0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009735631" comment="sssd-1.16.1-150300.23.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151531" comment="sssd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009735633" comment="sssd-common-1.16.1-150300.23.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009632505" comment="sssd-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009735638" comment="sssd-krb5-common-1.16.1-150300.23.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151533" comment="sssd-krb5-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009735639" comment="sssd-ldap-1.16.1-150300.23.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151534" comment="sssd-ldap is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242703" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42703</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42703" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42703" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42703" ref_url="https://www.suse.com/security/cve/CVE-2022-42703" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4273-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/026621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    mm/rmap.c in the Linux kernel before 5.19.7 has a use-after-free related to leaf anon_vma double reuse.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-13"/>
	<updated date="2023-03-30"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42703/">CVE-2022-42703</cve>
	<bugzilla href="https://bugzilla.suse.com/1204168">SUSE bug 1204168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204170">SUSE bug 1204170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206463">SUSE bug 1206463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208044">SUSE bug 1208044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209225">SUSE bug 1209225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724521" comment="kernel-default-5.3.18-150300.59.101.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724522" comment="kernel-default-base-5.3.18-150300.59.101.1.150300.18.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724435" comment="kernel-rt-5.3.18-150300.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242719" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42719</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42719" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42719" ref_url="https://www.suse.com/security/cve/CVE-2022-42719" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    A use-after-free in the mac80211 stack when parsing a multi-BSSID element in the Linux kernel 5.2 through 5.19.x before 5.19.16 could be used by attackers (able to inject WLAN frames) to crash the kernel and potentially execute code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-27"/>
	<updated date="2023-03-30"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42719/">CVE-2022-42719</cve>
	<bugzilla href="https://bugzilla.suse.com/1204051">SUSE bug 1204051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204292">SUSE bug 1204292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209225">SUSE bug 1209225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721862" comment="kernel-default-5.3.18-150300.59.98.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721863" comment="kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721582" comment="kernel-rt-5.3.18-150300.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42720</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42720" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42720" ref_url="https://www.suse.com/security/cve/CVE-2022-42720" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    Various refcounting bugs in the multi-BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to trigger use-after-free conditions to potentially execute code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-27"/>
	<updated date="2023-03-30"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42720/">CVE-2022-42720</cve>
	<bugzilla href="https://bugzilla.suse.com/1204059">SUSE bug 1204059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204291">SUSE bug 1204291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209225">SUSE bug 1209225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721862" comment="kernel-default-5.3.18-150300.59.98.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721863" comment="kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721582" comment="kernel-rt-5.3.18-150300.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42721</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42721" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42721" ref_url="https://www.suse.com/security/cve/CVE-2022-42721" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    A list management bug in BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to corrupt a linked list and, in turn, potentially execute code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-27"/>
	<updated date="2023-03-30"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42721/">CVE-2022-42721</cve>
	<bugzilla href="https://bugzilla.suse.com/1204060">SUSE bug 1204060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204290">SUSE bug 1204290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209225">SUSE bug 1209225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721862" comment="kernel-default-5.3.18-150300.59.98.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721863" comment="kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721582" comment="kernel-rt-5.3.18-150300.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42722</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42722" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42722" ref_url="https://www.suse.com/security/cve/CVE-2022-42722" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel 5.8 through 5.19.x before 5.19.16, local attackers able to inject WLAN frames into the mac80211 stack could cause a NULL pointer dereference denial-of-service attack against the beacon protection of P2P devices.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-27"/>
	<updated date="2023-03-30"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42722/">CVE-2022-42722</cve>
	<bugzilla href="https://bugzilla.suse.com/1204125">SUSE bug 1204125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204289">SUSE bug 1204289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209225">SUSE bug 1209225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721862" comment="kernel-default-5.3.18-150300.59.98.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721863" comment="kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721582" comment="kernel-rt-5.3.18-150300.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242895" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42895</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42895" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42895" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42895" ref_url="https://www.suse.com/security/cve/CVE-2022-42895" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013767.html" source="SUSE-SU"/>
    <description>
    There is an infoleak vulnerability in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_parse_conf_req function which can be used to leak kernel pointers remotely. We recommend upgrading past commit https://github.com/torvalds/linux/commit/b1a2cd50c0357f243b7435a732b4e62ba3157a2e https://www.google.com/url
    </description>
<advisory from="security@suse.de">
	<issued date="2022-12-24"/>
	<updated date="2023-03-18"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42895/">CVE-2022-42895</cve>
	<bugzilla href="https://bugzilla.suse.com/1205705">SUSE bug 1205705</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009729181" comment="kernel-default-5.3.18-150300.59.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009729182" comment="kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009729347" comment="kernel-rt-5.3.18-150300.112.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42896</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42896" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42896" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42896" ref_url="https://www.suse.com/security/cve/CVE-2022-42896" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013767.html" source="SUSE-SU"/>
    <description>
    There are use-after-free vulnerabilities in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_connect and l2cap_le_connect_req functions which may allow code execution and leaking kernel memory (respectively) remotely via Bluetooth. A remote attacker could execute code leaking kernel memory via Bluetooth if within proximity of the victim. We recommend upgrading past commit https://www.google.com/url https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4 https://www.google.com/url
    </description>
<advisory from="security@suse.de">
	<issued date="2022-12-24"/>
	<updated date="2023-03-18"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-42896/">CVE-2022-42896</cve>
	<bugzilla href="https://bugzilla.suse.com/1205709">SUSE bug 1205709</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009729181" comment="kernel-default-5.3.18-150300.59.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009729182" comment="kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009729347" comment="kernel-rt-5.3.18-150300.112.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42898</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42898" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42898" ref_url="https://www.suse.com/security/cve/CVE-2022-42898" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:3071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3099-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/026431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3100-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/026432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013559.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2023:0019-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WO45C5LQHPOWEJHKWCXPWLI54XMTTYQP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2023:0020-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VCW7YX6RG5EAFBRU3SLTXKN5NWVODXTH/" source="SUSE-SU"/>
    <description>
    PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.x before 1.20.1 has integer overflows that may lead to remote code execution (in KDC, kadmind, or a GSS or Kerberos application server) on 32-bit platforms (which have a resultant heap-based buffer overflow), and cause a denial of service on other platforms. This occurs in krb5_pac_parse in lib/krb5/krb/pac.c. Heimdal before 7.7.1 has "a similar bug."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-23"/>
	<updated date="2023-05-19"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-42898/">CVE-2022-42898</cve>
	<bugzilla href="https://bugzilla.suse.com/1205126">SUSE bug 1205126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205667">SUSE bug 1205667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207423">SUSE bug 1207423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207690">SUSE bug 1207690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211487">SUSE bug 1211487</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009734521" comment="krb5-1.19.2-150300.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151005" comment="krb5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009728218" comment="samba-client-libs-4.15.12+git.535.7750e5c95ef-150300.3.43.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009666847" comment="samba-client-libs is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20224292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-4292</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-4292" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4292" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-4292" ref_url="https://www.suse.com/security/cve/CVE-2022-4292" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:3493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013598.html" source="SUSE-SU"/>
    <description>
    Use After Free in GitHub repository vim/vim prior to 9.0.0882.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-12-29"/>
	<updated date="2023-03-31"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4292/">CVE-2022-4292</cve>
	<bugzilla href="https://bugzilla.suse.com/1206075">SUSE bug 1206075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208100">SUSE bug 1208100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208649">SUSE bug 1208649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208651">SUSE bug 1208651</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009729554" comment="vim-data-common-9.0.1040-150000.5.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009729641" comment="vim-small-9.0.1040-150000.5.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20224293" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-4293</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-4293" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4293" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-4293" ref_url="https://www.suse.com/security/cve/CVE-2022-4293" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:3493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013598.html" source="SUSE-SU"/>
    <description>
    Floating Point Comparison with Incorrect Operator in GitHub repository vim/vim prior to 9.0.0804.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-12-29"/>
	<updated date="2023-05-19"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4293/">CVE-2022-4293</cve>
	<bugzilla href="https://bugzilla.suse.com/1206077">SUSE bug 1206077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211489">SUSE bug 1211489</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009729554" comment="vim-data-common-9.0.1040-150000.5.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009729641" comment="vim-small-9.0.1040-150000.5.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42969</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42969" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42969" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42969" ref_url="https://www.suse.com/security/cve/CVE-2022-42969" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014002.html" source="SUSE-SU"/>
    <description>
    The py library through 1.11.0 for Python allows remote attackers to conduct a ReDoS (Regular expression Denial of Service) attack via a Subversion repository with crafted info data, because the InfoSvnCommand argument is mishandled.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-01-26"/>
	<updated date="2023-09-19"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42969/">CVE-2022-42969</cve>
	<bugzilla href="https://bugzilla.suse.com/1204364">SUSE bug 1204364</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009732670" comment="python3-py-1.10.0-150100.5.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009477849" comment="python3-py is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20224304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-4304</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-4304" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4304" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-4304" ref_url="https://www.suse.com/security/cve/CVE-2022-4304" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2622-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:29171-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3096-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015773.html" source="SUSE-SU"/>
    <description>
    A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve a successful decryption an attacker would have to be able to send a very large number of trial messages for decryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5, RSA-OEAP and RSASVE. For example, in a TLS connection, RSA is commonly used by a client to send an encrypted pre-master secret to the server. An attacker that had observed a genuine connection between a client and a server could use this flaw to send trial messages to the server and record the time taken to process them. After a sufficiently large number of messages the attacker could recover the pre-master secret used for the original connection and thus be able to decrypt the application data sent over that connection.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-08"/>
	<updated date="2023-09-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-4304/">CVE-2022-4304</cve>
	<bugzilla href="https://bugzilla.suse.com/1207534">SUSE bug 1207534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210067">SUSE bug 1210067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213146">SUSE bug 1213146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213289">SUSE bug 1213289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215014">SUSE bug 1215014</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009737673" comment="libopenssl-1_1-devel-1.1.1d-150200.11.57.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231072" comment="libopenssl-1_1-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009737675" comment="libopenssl1_1-1.1.1d-150200.11.57.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177120" comment="libopenssl1_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009737677" comment="libopenssl1_1-hmac-1.1.1d-150200.11.57.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231074" comment="libopenssl1_1-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009737679" comment="openssl-1_1-1.1.1d-150200.11.57.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177122" comment="openssl-1_1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202243552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-43552</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-43552" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43552" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-43552" ref_url="https://www.suse.com/security/cve/CVE-2022-43552" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:3421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3432-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3438-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-December/027005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3439-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-December/027006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2226-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2228-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029437.html" source="SUSE-SU"/>
    <description>
    A use after free vulnerability exists in curl &lt;7.87.0. Curl can be asked to *tunnel* virtually all protocols it supports through an HTTP proxy. HTTP proxies can (and often do) deny such tunnel operations. When getting denied to tunnel the specific protocols SMB or TELNET, curl would use a heap-allocated struct after it had been freed, in its transfer shutdown code path.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-12-29"/>
	<updated date="2023-05-26"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-43552/">CVE-2022-43552</cve>
	<bugzilla href="https://bugzilla.suse.com/1206309">SUSE bug 1206309</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009729985" comment="curl-7.66.0-150200.4.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009729986" comment="libcurl4-7.66.0-150200.4.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202243680" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-43680</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-43680" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43680" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-43680" ref_url="https://www.suse.com/security/cve/CVE-2022-43680" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2831-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/025984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2832-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/025985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2858-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/026010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012847.html" source="SUSE-SU"/>
    <description>
    In libexpat through 2.4.9, there is a use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate in out-of-memory situations.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-09"/>
	<updated date="2023-04-15"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-43680/">CVE-2022-43680</cve>
	<bugzilla href="https://bugzilla.suse.com/1204708">SUSE bug 1204708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205590">SUSE bug 1205590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205598">SUSE bug 1205598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208339">SUSE bug 1208339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009721903" comment="libexpat1-2.2.5-150000.3.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151332" comment="libexpat1 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202243750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-43750</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-43750" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43750" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-43750" ref_url="https://www.suse.com/security/cve/CVE-2022-43750" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4273-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/026621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
    <description>
    drivers/usb/mon/mon_bin.c in usbmon in the Linux kernel before 5.19.15 and 6.x before 6.0.1 allows a user-space client to corrupt the monitor's internal memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-13"/>
	<updated date="2023-05-19"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-43750/">CVE-2022-43750</cve>
	<bugzilla href="https://bugzilla.suse.com/1204653">SUSE bug 1204653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211484">SUSE bug 1211484</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724521" comment="kernel-default-5.3.18-150300.59.101.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724522" comment="kernel-default-base-5.3.18-150300.59.101.1.150300.18.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724435" comment="kernel-rt-5.3.18-150300.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20224378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-4378</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-4378" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4378" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-4378" ref_url="https://www.suse.com/security/cve/CVE-2022-4378" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4560-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-December/026940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4569-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-December/026938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-12-24"/>
	<updated date="2023-09-12"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4378/">CVE-2022-4378</cve>
	<bugzilla href="https://bugzilla.suse.com/1206207">SUSE bug 1206207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206228">SUSE bug 1206228</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208030">SUSE bug 1208030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208085">SUSE bug 1208085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209225">SUSE bug 1209225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211118">SUSE bug 1211118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214268">SUSE bug 1214268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009729181" comment="kernel-default-5.3.18-150300.59.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009729182" comment="kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009729347" comment="kernel-rt-5.3.18-150300.112.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202243945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-43945</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-43945" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43945" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-43945" ref_url="https://www.suse.com/security/cve/CVE-2022-43945" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4560-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-December/026940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4569-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-December/026938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2146-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2148-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2151-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2162-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2232-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029439.html" source="SUSE-SU"/>
		<reference ref_id="TID000021059" ref_url="https://www.suse.com/support/kb/doc/?id=000021059" source="SUSE-SU"/>
    <description>
    The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
    </description>
<advisory from="security@suse.de">
	<issued date="2022-12-24"/>
	<updated date="2023-06-16"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-43945/">CVE-2022-43945</cve>
	<bugzilla href="https://bugzilla.suse.com/1205128">SUSE bug 1205128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205130">SUSE bug 1205130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208030">SUSE bug 1208030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208085">SUSE bug 1208085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209225">SUSE bug 1209225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210124">SUSE bug 1210124</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009729181" comment="kernel-default-5.3.18-150300.59.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009729182" comment="kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009729347" comment="kernel-rt-5.3.18-150300.112.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202243995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-43995</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-43995" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43995" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-43995" ref_url="https://www.suse.com/security/cve/CVE-2022-43995" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:3020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4077-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/026309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013148.html" source="SUSE-SU"/>
    <description>
    Sudo 1.8.0 through 1.9.12, with the crypt() password backend, contains a plugins/sudoers/auth/passwd.c array-out-of-bounds error that can result in a heap-based buffer over-read. This can be triggered by arbitrary local users with access to Sudo by entering a password of seven characters or fewer. The impact could vary depending on the system libraries, compiler, and processor architecture.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-19"/>
	<updated date="2023-03-30"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-43995/">CVE-2022-43995</cve>
	<bugzilla href="https://bugzilla.suse.com/1204986">SUSE bug 1204986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205838">SUSE bug 1205838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205969">SUSE bug 1205969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206905">SUSE bug 1206905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009725788" comment="sudo-1.9.5p2-150300.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151407" comment="sudo is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20224415" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-4415</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-4415" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4415" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-4415" ref_url="https://www.suse.com/security/cve/CVE-2022-4415" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:3458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013348.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0058-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-January/027219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014389.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in systemd. This security flaw can cause a local information leak due to systemd-coredump not respecting the fs.suid_dumpable kernel setting.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-12-29"/>
	<updated date="2023-05-10"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-4415/">CVE-2022-4415</cve>
	<bugzilla href="https://bugzilla.suse.com/1205000">SUSE bug 1205000</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009730368" comment="libsystemd0-246.16-150300.7.57.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154102" comment="libsystemd0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009730370" comment="libudev1-246.16-150300.7.57.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151691" comment="libudev1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009730371" comment="systemd-246.16-150300.7.57.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151693" comment="systemd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009730372" comment="systemd-container-246.16-150300.7.57.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239132" comment="systemd-container is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009730376" comment="systemd-journal-remote-246.16-150300.7.57.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009625973" comment="systemd-journal-remote is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009730377" comment="systemd-sysvinit-246.16-150300.7.57.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151697" comment="systemd-sysvinit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009730378" comment="udev-246.16-150300.7.57.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151699" comment="udev is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20224450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-4450</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-4450" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4450" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-4450" ref_url="https://www.suse.com/security/cve/CVE-2022-4450" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013654.html" source="SUSE-SU"/>
    <description>
    The function PEM_read_bio_ex() reads a PEM file from a BIO and parses and decodes the "name" (e.g. "CERTIFICATE"), any header data and the payload data. If the function succeeds then the "name_out", "header" and "data" arguments are populated with pointers to buffers containing the relevant decoded data. The caller is responsible for freeing those buffers. It is possible to construct a PEM file that results in 0 bytes of payload data. In this case PEM_read_bio_ex() will return a failure code but will populate the header argument with a pointer to a buffer that has already been freed. If the caller also frees this buffer then a double free will occur. This will most likely lead to a crash. This could be exploited by an attacker who has the ability to supply malicious PEM files for parsing to achieve a denial of service attack. The functions PEM_read_bio() and PEM_read() are simple wrappers around PEM_read_bio_ex() and therefore these functions are also directly affected. These functions are also called indirectly by a number of other OpenSSL functions including PEM_X509_INFO_read_bio_ex() and SSL_CTX_use_serverinfo_file() which are also vulnerable. Some OpenSSL internal uses of these functions are not vulnerable because the caller does not free the header argument if PEM_read_bio_ex() returns a failure code. These locations include the PEM_read_bio_TYPE() functions as well as the decoders introduced in OpenSSL 3.0. The OpenSSL asn1parse command line application is also impacted by this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-08"/>
	<updated date="2023-05-10"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4450/">CVE-2022-4450</cve>
	<bugzilla href="https://bugzilla.suse.com/1207538">SUSE bug 1207538</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009737673" comment="libopenssl-1_1-devel-1.1.1d-150200.11.57.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231072" comment="libopenssl-1_1-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009737675" comment="libopenssl1_1-1.1.1d-150200.11.57.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177120" comment="libopenssl1_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009737677" comment="libopenssl1_1-hmac-1.1.1d-150200.11.57.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231074" comment="libopenssl1_1-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009737679" comment="openssl-1_1-1.1.1d-150200.11.57.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177122" comment="openssl-1_1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202244638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-44638</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-44638" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44638" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-44638" ref_url="https://www.suse.com/security/cve/CVE-2022-44638" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013121.html" source="SUSE-SU"/>
    <description>
    In libpixman in Pixman before 0.42.2, there is an out-of-bounds write (aka heap-based buffer overflow) in rasterize_edges_8 due to an integer overflow in pixman_sample_floor_y.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-22"/>
	<updated date="2023-05-19"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-44638/">CVE-2022-44638</cve>
	<bugzilla href="https://bugzilla.suse.com/1205033">SUSE bug 1205033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208313">SUSE bug 1208313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208345">SUSE bug 1208345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211497">SUSE bug 1211497</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009724965" comment="libpixman-1-0-0.34.0-150000.7.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009726389" comment="libpixman-1-0 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202245061" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-45061</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-45061" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45061" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-45061" ref_url="https://www.suse.com/security/cve/CVE-2022-45061" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:3048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014044.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Python before 3.11.1. An unnecessary quadratic algorithm exists in one path when processing some inputs to the IDNA (RFC 3490) decoder, such that a crafted, unreasonably long name being presented to the decoder could lead to a CPU denial of service. Hostnames are often supplied by remote servers that could be controlled by a malicious actor; in such a scenario, they could trigger excessive CPU consumption on the client attempting to make use of an attacker-supplied supposed hostname. For example, the attack payload could be placed in the Location header of an HTTP response with status code 302. A fix is planned in 3.11.1, 3.10.9, 3.9.16, 3.8.16, and 3.7.16.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-28"/>
	<updated date="2023-05-19"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45061/">CVE-2022-45061</cve>
	<bugzilla href="https://bugzilla.suse.com/1205244">SUSE bug 1205244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211488">SUSE bug 1211488</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009742213" comment="libpython3_6m1_0-3.6.15-150300.10.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009742214" comment="python3-3.6.15-150300.10.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009742215" comment="python3-base-3.6.15-150300.10.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202245934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-45934</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-45934" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-45934" ref_url="https://www.suse.com/security/cve/CVE-2022-45934" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 6.0.10. l2cap_config_req in net/bluetooth/l2cap_core.c has an integer wraparound via L2CAP_CONF_REQ packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-12-24"/>
	<updated date="2023-06-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-45934/">CVE-2022-45934</cve>
	<bugzilla href="https://bugzilla.suse.com/1205796">SUSE bug 1205796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212292">SUSE bug 1212292</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009729181" comment="kernel-default-5.3.18-150300.59.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009729182" comment="kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009729347" comment="kernel-rt-5.3.18-150300.112.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20224662" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-4662</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-4662" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4662" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-4662" ref_url="https://www.suse.com/security/cve/CVE-2022-4662" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013982.html" source="SUSE-SU"/>
    <description>
    A flaw incorrect access control in the Linux kernel USB core subsystem was found in the way user attaches usb device. A local user could use this flaw to crash the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-01-26"/>
	<updated date="2023-03-18"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4662/">CVE-2022-4662</cve>
	<bugzilla href="https://bugzilla.suse.com/1206664">SUSE bug 1206664</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009735606" comment="kernel-default-5.3.18-150300.59.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009735607" comment="kernel-default-base-5.3.18-150300.59.109.1.150300.18.62.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009734769" comment="kernel-rt-5.3.18-150300.115.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202246908" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-46908</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-46908" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46908" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-46908" ref_url="https://www.suse.com/security/cve/CVE-2022-46908" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:3472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1295-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015347.html" source="SUSE-SU"/>
    <description>
    SQLite through 3.40.0, when relying on --safe for execution of an untrusted CLI script, does not properly implement the azProhibitedFunctions protection mechanism, and instead allows UDF functions such as WRITEFILE.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-12-29"/>
	<updated date="2023-06-30"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-46908/">CVE-2022-46908</cve>
	<bugzilla href="https://bugzilla.suse.com/1206337">SUSE bug 1206337</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009729752" comment="libsqlite3-0-3.39.3-150000.3.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153745" comment="libsqlite3-0 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20224744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-4744</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-4744" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4744" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-4744" ref_url="https://www.suse.com/security/cve/CVE-2022-4744" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1800-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1802-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1811-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1892-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1992-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2695-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2714-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2724-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2727-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2755-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    A double-free flaw was found in the Linux kernel’s TUN/TAP device driver functionality in how a user registers the device when the register_netdevice function fails (NETDEV_REGISTER notifier). This flaw allows a local user to crash or potentially escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-04-12"/>
	<updated date="2023-09-15"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4744/">CVE-2022-4744</cve>
	<bugzilla href="https://bugzilla.suse.com/1209635">SUSE bug 1209635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209672">SUSE bug 1209672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211833">SUSE bug 1211833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009753636" comment="kernel-default-5.3.18-150300.59.118.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009753637" comment="kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009753815" comment="kernel-rt-5.3.18-150300.124.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202247520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-47520</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-47520" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47520" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-47520" ref_url="https://www.suse.com/security/cve/CVE-2022-47520" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013959.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 6.0.11. Missing offset validation in drivers/net/wireless/microchip/wilc1000/hif.c in the WILC1000 wireless driver can trigger an out-of-bounds read when parsing a Robust Security Network (RSN) information element from a Netlink packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-01-26"/>
	<updated date="2023-03-18"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-47520/">CVE-2022-47520</cve>
	<bugzilla href="https://bugzilla.suse.com/1206515">SUSE bug 1206515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207823">SUSE bug 1207823</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009735606" comment="kernel-default-5.3.18-150300.59.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009735607" comment="kernel-default-base-5.3.18-150300.59.109.1.150300.18.62.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009742406" comment="kernel-rt-5.3.18-150300.118.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202247629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-47629</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-47629" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47629" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-47629" ref_url="https://www.suse.com/security/cve/CVE-2022-47629" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0031-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0056-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013779.html" source="SUSE-SU"/>
    <description>
    Libksba before 1.6.3 is prone to an integer overflow vulnerability in the CRL signature parser.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-01-10"/>
	<updated date="2023-04-29"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-47629/">CVE-2022-47629</cve>
	<bugzilla href="https://bugzilla.suse.com/1206579">SUSE bug 1206579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009730954" comment="libksba8-1.3.5-150000.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152539" comment="libksba8 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202247929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-47929</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-47929" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-47929" ref_url="https://www.suse.com/security/cve/CVE-2022-47929" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014076.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 6.1.6, a NULL pointer dereference bug in the traffic control subsystem allows an unprivileged user to trigger a denial of service (system crash) via a crafted traffic control configuration that is set up with "tc qdisc" and "tc class" commands. This affects qdisc_graft in net/sched/sch_api.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-01-26"/>
	<updated date="2023-03-18"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-47929/">CVE-2022-47929</cve>
	<bugzilla href="https://bugzilla.suse.com/1207237">SUSE bug 1207237</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009735606" comment="kernel-default-5.3.18-150300.59.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009735607" comment="kernel-default-base-5.3.18-150300.59.109.1.150300.18.62.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009745026" comment="kernel-rt-5.3.18-150300.121.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248281" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48281</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48281" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48281" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48281" ref_url="https://www.suse.com/security/cve/CVE-2022-48281" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013719.html" source="SUSE-SU"/>
    <description>
    processCropSelections in tools/tiffcrop.c in LibTIFF through 4.5.0 has a heap-based buffer overflow (e.g., "WRITE of size 307203") via a crafted TIFF image.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-11"/>
	<updated date="2023-03-31"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48281/">CVE-2022-48281</cve>
	<bugzilla href="https://bugzilla.suse.com/1207413">SUSE bug 1207413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208655">SUSE bug 1208655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209328">SUSE bug 1209328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209937">SUSE bug 1209937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009735647" comment="libtiff5-4.0.9-150000.45.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248303" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48303</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48303" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48303" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48303" ref_url="https://www.suse.com/security/cve/CVE-2022-48303" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:677-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013845.html" source="SUSE-SU"/>
    <description>
    GNU Tar through 1.34 has a one-byte out-of-bounds read that results in use of uninitialized memory for a conditional jump. Exploitation to change the flow of control has not been demonstrated. The issue occurs in from_header in list.c via a V7 archive in which mtime has approximately 11 whitespace characters.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-21"/>
	<updated date="2023-06-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-48303/">CVE-2022-48303</cve>
	<bugzilla href="https://bugzilla.suse.com/1207753">SUSE bug 1207753</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009740152" comment="tar-1.34-150000.3.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151391" comment="tar is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20224899" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-4899</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-4899" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4899" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-4899" ref_url="https://www.suse.com/security/cve/CVE-2022-4899" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1688-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014777.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in zstd v1.4.10, where an attacker can supply empty string as an argument to the command line tool to cause buffer overrun.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-04-29"/>
	<updated date="2023-06-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4899/">CVE-2022-4899</cve>
	<bugzilla href="https://bugzilla.suse.com/1209533">SUSE bug 1209533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009748403" comment="libzstd1-1.4.4-150000.1.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009262525" comment="libzstd1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009748404" comment="zstd-1.4.4-150000.1.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009262526" comment="zstd is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20224904" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-4904</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-4904" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4904" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-4904" ref_url="https://www.suse.com/security/cve/CVE-2022-4904" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3420-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031179.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the c-ares package. The ares_set_sortlist is missing checks about the validity of the input string, which allows a possible arbitrary length stack overflow. This issue may cause a denial of service or a limited impact on confidentiality and integrity.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-24"/>
	<updated date="2023-08-29"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-4904/">CVE-2022-4904</cve>
	<bugzilla href="https://bugzilla.suse.com/1208067">SUSE bug 1208067</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009739388" comment="libcares2-1.19.0-150000.3.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153706" comment="libcares2 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230045" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0045</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0045" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0045" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0045" ref_url="https://www.suse.com/security/cve/CVE-2023-0045" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    The current implementation of the prctl syscall does not issue an IBPB immediately during the syscall. The ib_prctl_set ?function updates the Thread Information Flags (TIFs) for the task and updates the SPEC_CTRL MSR on the function __speculation_ctrl_update, but the IBPB is only issued on the next schedule, when the TIF bits are checked. This leaves the victim vulnerable to values already injected on the BTB, prior to the prctl syscall. ?The patch that added the support for the conditional mitigation via prctl (ib_prctl_set) dates back to the kernel 4.9.176.

We recommend upgrading past commit?a664ec9158eeddd75121d39c9a0758016097fa96


    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-17"/>
	<updated date="2023-09-12"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-0045/">CVE-2023-0045</cve>
	<bugzilla href="https://bugzilla.suse.com/1207773">SUSE bug 1207773</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744746" comment="kernel-default-5.3.18-150300.59.115.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744747" comment="kernel-default-base-5.3.18-150300.59.115.2.150300.18.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009745026" comment="kernel-rt-5.3.18-150300.121.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0049</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0049" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0049" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0049" ref_url="https://www.suse.com/security/cve/CVE-2023-0049" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013596.html" source="SUSE-SU"/>
    <description>
    Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.1143.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-01-31"/>
	<updated date="2023-03-18"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-0049/">CVE-2023-0049</cve>
	<bugzilla href="https://bugzilla.suse.com/1206866">SUSE bug 1206866</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009735253" comment="vim-data-common-9.0.1234-150000.5.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009736710" comment="vim-small-9.0.1234-150000.5.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230051" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0051</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0051" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0051" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0051" ref_url="https://www.suse.com/security/cve/CVE-2023-0051" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013596.html" source="SUSE-SU"/>
    <description>
    Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1144.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-01-31"/>
	<updated date="2023-03-18"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-0051/">CVE-2023-0051</cve>
	<bugzilla href="https://bugzilla.suse.com/1206867">SUSE bug 1206867</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009735253" comment="vim-data-common-9.0.1234-150000.5.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009736710" comment="vim-small-9.0.1234-150000.5.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0054</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0054" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0054" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0054" ref_url="https://www.suse.com/security/cve/CVE-2023-0054" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013596.html" source="SUSE-SU"/>
    <description>
    Out-of-bounds Write in GitHub repository vim/vim prior to 9.0.1145.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-01-31"/>
	<updated date="2023-03-18"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-0054/">CVE-2023-0054</cve>
	<bugzilla href="https://bugzilla.suse.com/1206868">SUSE bug 1206868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009735253" comment="vim-data-common-9.0.1234-150000.5.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009736710" comment="vim-small-9.0.1234-150000.5.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0179</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0179" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0179" ref_url="https://www.suse.com/security/cve/CVE-2023-0179" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0409-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    A buffer overflow vulnerability was found in the Netfilter subsystem in the Linux Kernel. This issue could allow the leakage of both stack and heap addresses, and potentially allow Local Privilege Escalation to the root user via arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2023-09-12"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0179/">CVE-2023-0179</cve>
	<bugzilla href="https://bugzilla.suse.com/1207034">SUSE bug 1207034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207139">SUSE bug 1207139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215208">SUSE bug 1215208</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009739408" comment="kernel-default-5.3.18-150300.59.112.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009739409" comment="kernel-default-base-5.3.18-150300.59.112.1.150300.18.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009745026" comment="kernel-rt-5.3.18-150300.121.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0215</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0215" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0215" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0215" ref_url="https://www.suse.com/security/cve/CVE-2023-0215" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014009.html" source="SUSE-SU"/>
    <description>
    The public API function BIO_new_NDEF is a helper function used for streaming
ASN.1 data via a BIO. It is primarily used internally to OpenSSL to support the
SMIME, CMS and PKCS7 streaming capabilities, but may also be called directly by
end user applications.

The function receives a BIO from the caller, prepends a new BIO_f_asn1 filter
BIO onto the front of it to form a BIO chain, and then returns the new head of
the BIO chain to the caller. Under certain conditions, for example if a CMS
recipient public key is invalid, the new filter BIO is freed and the function
returns a NULL result indicating a failure. However, in this case, the BIO chain
is not properly cleaned up and the BIO passed by the caller still retains
internal pointers to the previously freed filter BIO. If the caller then goes on
to call BIO_pop() on the BIO then a use-after-free will occur. This will most
likely result in a crash.



This scenario occurs directly in the internal function B64_write_ASN1() which
may cause BIO_new_NDEF() to be called and will subsequently call BIO_pop() on
the BIO. This internal function is in turn called by the public API functions
PEM_write_bio_ASN1_stream, PEM_write_bio_CMS_stream, PEM_write_bio_PKCS7_stream,
SMIME_write_ASN1, SMIME_write_CMS and SMIME_write_PKCS7.

Other public API functions that may be impacted by this include
i2d_ASN1_bio_stream, BIO_new_CMS, BIO_new_PKCS7, i2d_CMS_bio_stream and
i2d_PKCS7_bio_stream.

The OpenSSL cms and smime command line applications are similarly affected.




    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-08"/>
	<updated date="2023-08-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0215/">CVE-2023-0215</cve>
	<bugzilla href="https://bugzilla.suse.com/1207536">SUSE bug 1207536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213146">SUSE bug 1213146</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009737673" comment="libopenssl-1_1-devel-1.1.1d-150200.11.57.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231072" comment="libopenssl-1_1-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009737675" comment="libopenssl1_1-1.1.1d-150200.11.57.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177120" comment="libopenssl1_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009737677" comment="libopenssl1_1-hmac-1.1.1d-150200.11.57.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231074" comment="libopenssl1_1-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009737679" comment="openssl-1_1-1.1.1d-150200.11.57.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177122" comment="openssl-1_1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0225</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0225" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0225" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0225" ref_url="https://www.suse.com/security/cve/CVE-2023-0225" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014245.html" source="SUSE-SU"/>
    <description>
    A flaw was found in Samba. An incomplete access check on dnsHostName allows authenticated but otherwise unprivileged users to delete this attribute from any object in the directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-30"/>
	<updated date="2023-06-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-0225/">CVE-2023-0225</cve>
	<bugzilla href="https://bugzilla.suse.com/1209483">SUSE bug 1209483</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009751546" comment="libldb2-2.4.4-150300.3.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291435" comment="libldb2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009751559" comment="samba-client-libs-4.15.13+git.636.53d93c5b9d6-150300.3.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009666847" comment="samba-client-libs is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230266" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0266</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0266" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0266" ref_url="https://www.suse.com/security/cve/CVE-2023-0266" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1619-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1639-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1640-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1649-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1708-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028530.html" source="SUSE-SU"/>
    <description>
    A use after free vulnerability exists in the ALSA PCM package in the Linux Kernel.?SNDRV_CTL_IOCTL_ELEM_{READ|WRITE}32 is missing locks that can be used in a use-after-free that can result in a priviledge escalation to gain ring0 access from the system user. We recommend upgrading past commit?56b88b50565cd8b946a2d00b0c83927b7ebb055e

    </description>
<advisory from="security@suse.de">
	<issued date="2023-01-26"/>
	<updated date="2023-08-19"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0266/">CVE-2023-0266</cve>
	<bugzilla href="https://bugzilla.suse.com/1207134">SUSE bug 1207134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207190">SUSE bug 1207190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214128">SUSE bug 1214128</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009735606" comment="kernel-default-5.3.18-150300.59.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009735607" comment="kernel-default-base-5.3.18-150300.59.109.1.150300.18.62.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009745026" comment="kernel-rt-5.3.18-150300.121.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230286" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0286</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0286" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0286" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0286" ref_url="https://www.suse.com/security/cve/CVE-2023-0286" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014009.html" source="SUSE-SU"/>
    <description>
    There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an ASN1_STRING. When CRL checking is enabled (i.e. the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, neither of which need to have a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. As such, this vulnerability is most likely to only affect applications which have implemented their own functionality for retrieving CRLs over a network.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-08"/>
	<updated date="2023-09-12"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0286/">CVE-2023-0286</cve>
	<bugzilla href="https://bugzilla.suse.com/1207533">SUSE bug 1207533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207569">SUSE bug 1207569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211136">SUSE bug 1211136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211503">SUSE bug 1211503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213146">SUSE bug 1213146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214269">SUSE bug 1214269</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009737673" comment="libopenssl-1_1-devel-1.1.1d-150200.11.57.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231072" comment="libopenssl-1_1-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009737675" comment="libopenssl1_1-1.1.1d-150200.11.57.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177120" comment="libopenssl1_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009737677" comment="libopenssl1_1-hmac-1.1.1d-150200.11.57.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231074" comment="libopenssl1_1-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009737679" comment="openssl-1_1-1.1.1d-150200.11.57.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177122" comment="openssl-1_1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0288</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0288" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0288" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0288" ref_url="https://www.suse.com/security/cve/CVE-2023-0288" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013596.html" source="SUSE-SU"/>
    <description>
    Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1189.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-01-31"/>
	<updated date="2023-03-18"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-0288/">CVE-2023-0288</cve>
	<bugzilla href="https://bugzilla.suse.com/1207162">SUSE bug 1207162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009735253" comment="vim-data-common-9.0.1234-150000.5.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009736710" comment="vim-small-9.0.1234-150000.5.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230361" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0361</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0361" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0361" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0361" ref_url="https://www.suse.com/security/cve/CVE-2023-0361" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013969.html" source="SUSE-SU"/>
    <description>
    A timing side-channel in the handling of RSA ClientKeyExchange messages was discovered in GnuTLS. This side-channel can be sufficient to recover the key encrypted in the RSA ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption the attacker would need to send a large amount of specially crafted messages to the vulnerable server. By recovering the secret from the ClientKeyExchange message, the attacker would be able to decrypt the application data exchanged over that connection.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-04"/>
	<updated date="2023-03-18"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-0361/">CVE-2023-0361</cve>
	<bugzilla href="https://bugzilla.suse.com/1208143">SUSE bug 1208143</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009740806" comment="gnutls-3.6.7-150200.14.25.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151156" comment="gnutls is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009740807" comment="libgnutls30-3.6.7-150200.14.25.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177128" comment="libgnutls30 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009740808" comment="libgnutls30-hmac-3.6.7-150200.14.25.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281488" comment="libgnutls30-hmac is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230394" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0394</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0394" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0394" ref_url="https://www.suse.com/security/cve/CVE-2023-0394" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1802-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1992-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference flaw was found in rawv6_push_pending_frames in net/ipv6/raw.c in the network subcomponent in the Linux kernel. This flaw causes the system to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-06"/>
	<updated date="2023-09-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0394/">CVE-2023-0394</cve>
	<bugzilla href="https://bugzilla.suse.com/1207168">SUSE bug 1207168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009753636" comment="kernel-default-5.3.18-150300.59.118.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009753637" comment="kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009753815" comment="kernel-rt-5.3.18-150300.124.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0433</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0433" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0433" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0433" ref_url="https://www.suse.com/security/cve/CVE-2023-0433" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013596.html" source="SUSE-SU"/>
    <description>
    Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1225.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-01-31"/>
	<updated date="2023-03-18"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0433/">CVE-2023-0433</cve>
	<bugzilla href="https://bugzilla.suse.com/1207396">SUSE bug 1207396</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009735253" comment="vim-data-common-9.0.1234-150000.5.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009736710" comment="vim-small-9.0.1234-150000.5.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0461</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0461" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0461" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0461" ref_url="https://www.suse.com/security/cve/CVE-2023-0461" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1800-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1811-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1892-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2371-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2405" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2416" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2423" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2425" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2431" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2448-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2455-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    There is a use-after-free vulnerability in the Linux Kernel which can be exploited to achieve local privilege escalation. To reach the vulnerability kernel configuration flag CONFIG_TLS?or CONFIG_XFRM_ESPINTCP?has to be configured, but the operation does not require any privilege.

There is a use-after-free bug of icsk_ulp_data?of a struct inet_connection_sock.

When CONFIG_TLS?is enabled, user can install a tls context (struct tls_context) on a connected tcp socket. The context is not cleared if this socket is disconnected and reused as a listener. If a new socket is created from the listener, the context is inherited and vulnerable.

The setsockopt?TCP_ULP?operation does not require any privilege.

We recommend upgrading past commit?2c02d41d71f90a5168391b6a5f2954112ba2307c
    </description>
<advisory from="security@suse.de">
	<issued date="2023-04-12"/>
	<updated date="2023-07-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0461/">CVE-2023-0461</cve>
	<bugzilla href="https://bugzilla.suse.com/1208787">SUSE bug 1208787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208911">SUSE bug 1208911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211833">SUSE bug 1211833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009753636" comment="kernel-default-5.3.18-150300.59.118.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009753637" comment="kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009753815" comment="kernel-rt-5.3.18-150300.124.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0464</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0464" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0464" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0464" ref_url="https://www.suse.com/security/cve/CVE-2023-0464" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:968-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:970-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:974-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:979-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:982-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:987-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:988-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:989-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:990-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1703-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1737-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1738-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1745-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1746-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1754-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1790-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028696.html" source="SUSE-SU"/>
    <description>
    A security vulnerability has been identified in all supported versions

of OpenSSL related to the verification of X.509 certificate chains
that include policy constraints.  Attackers may be able to exploit this
vulnerability by creating a malicious certificate chain that triggers
exponential use of computational resources, leading to a denial-of-service
(DoS) attack on affected systems.

Policy processing is disabled by default but can be enabled by passing
the `-policy' argument to the command line utilities or by calling the
`X509_VERIFY_PARAM_set1_policies()' function.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-04-07"/>
	<updated date="2023-06-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0464/">CVE-2023-0464</cve>
	<bugzilla href="https://bugzilla.suse.com/1209624">SUSE bug 1209624</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009752983" comment="libopenssl-1_1-devel-1.1.1d-150200.11.62.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231072" comment="libopenssl-1_1-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009752985" comment="libopenssl1_1-1.1.1d-150200.11.62.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177120" comment="libopenssl1_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009752987" comment="libopenssl1_1-hmac-1.1.1d-150200.11.62.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231074" comment="libopenssl1_1-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009752989" comment="openssl-1_1-1.1.1d-150200.11.62.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177122" comment="openssl-1_1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0465</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0465" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0465" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0465" ref_url="https://www.suse.com/security/cve/CVE-2023-0465" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1790-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1794-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1898-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014557.html" source="SUSE-SU"/>
    <description>
    Applications that use a non-default option when verifying certificates may be
vulnerable to an attack from a malicious CA to circumvent certain checks.

Invalid certificate policies in leaf certificates are silently ignored by
OpenSSL and other certificate policy checks are skipped for that certificate.
A malicious CA could use this to deliberately assert invalid certificate policies
in order to circumvent policy checking on the certificate altogether.

Policy processing is disabled by default but can be enabled by passing
the `-policy' argument to the command line utilities or by calling the
`X509_VERIFY_PARAM_set1_policies()' function.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-04-07"/>
	<updated date="2023-09-06"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-0465/">CVE-2023-0465</cve>
	<bugzilla href="https://bugzilla.suse.com/1209878">SUSE bug 1209878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212331">SUSE bug 1212331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215014">SUSE bug 1215014</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009752983" comment="libopenssl-1_1-devel-1.1.1d-150200.11.62.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231072" comment="libopenssl-1_1-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009752985" comment="libopenssl1_1-1.1.1d-150200.11.62.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177120" comment="libopenssl1_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009752987" comment="libopenssl1_1-hmac-1.1.1d-150200.11.62.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231074" comment="libopenssl1_1-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009752989" comment="openssl-1_1-1.1.1d-150200.11.62.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177122" comment="openssl-1_1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0466</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0466" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0466" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0466" ref_url="https://www.suse.com/security/cve/CVE-2023-0466" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1790-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1794-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1898-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014520.html" source="SUSE-SU"/>
    <description>
    The function X509_VERIFY_PARAM_add0_policy() is documented to
implicitly enable the certificate policy check when doing certificate
verification. However the implementation of the function does not
enable the check which allows certificates with invalid or incorrect
policies to pass the certificate verification.

As suddenly enabling the policy check could break existing deployments it was
decided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy()
function.

Instead the applications that require OpenSSL to perform certificate
policy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly
enable the policy check by calling X509_VERIFY_PARAM_set_flags() with
the X509_V_FLAG_POLICY_CHECK flag argument.

Certificate policy checks are disabled by default in OpenSSL and are not
commonly used by applications.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-04-07"/>
	<updated date="2023-06-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2/CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-0466/">CVE-2023-0466</cve>
	<bugzilla href="https://bugzilla.suse.com/1209873">SUSE bug 1209873</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009752983" comment="libopenssl-1_1-devel-1.1.1d-150200.11.62.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231072" comment="libopenssl-1_1-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009752985" comment="libopenssl1_1-1.1.1d-150200.11.62.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177120" comment="libopenssl1_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009752987" comment="libopenssl1_1-hmac-1.1.1d-150200.11.62.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231074" comment="libopenssl1_1-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009752989" comment="openssl-1_1-1.1.1d-150200.11.62.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177122" comment="openssl-1_1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0512</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0512" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0512" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0512" ref_url="https://www.suse.com/security/cve/CVE-2023-0512" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0781-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029038.html" source="SUSE-SU"/>
    <description>
    Divide By Zero in GitHub repository vim/vim prior to 9.0.1247.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-17"/>
	<updated date="2023-06-16"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0512/">CVE-2023-0512</cve>
	<bugzilla href="https://bugzilla.suse.com/1207780">SUSE bug 1207780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210385">SUSE bug 1210385</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009743831" comment="vim-data-common-9.0.1386-150000.5.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009743853" comment="vim-small-9.0.1386-150000.5.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0590</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0590" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0590" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0590" ref_url="https://www.suse.com/security/cve/CVE-2023-0590" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0767-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1801-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1803-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1848-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1973-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1975-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1982-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2024-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2031-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2043-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2232-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2506-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in qdisc_graft in net/sched/sch_api.c in the Linux Kernel due to a race problem. This flaw leads to a denial of service issue. If patch ebda44da44f6 ("net: sched: fix race condition in qdisc_graft()") not applied yet, then kernel could be affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-17"/>
	<updated date="2023-07-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0590/">CVE-2023-0590</cve>
	<bugzilla href="https://bugzilla.suse.com/1207795">SUSE bug 1207795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207822">SUSE bug 1207822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211495">SUSE bug 1211495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211833">SUSE bug 1211833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744746" comment="kernel-default-5.3.18-150300.59.115.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744747" comment="kernel-default-base-5.3.18-150300.59.115.2.150300.18.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009745026" comment="kernel-rt-5.3.18-150300.121.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0597</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0597" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0597" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0597" ref_url="https://www.suse.com/security/cve/CVE-2023-0597" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2232-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    A flaw possibility of memory leak in the Linux kernel cpu_entry_area mapping of X86 CPU data to memory was found in the way user can guess location of exception stack(s) or other important data. A local user could use this flaw to get access to some important data with expected location in memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-17"/>
	<updated date="2023-07-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-0597/">CVE-2023-0597</cve>
	<bugzilla href="https://bugzilla.suse.com/1207845">SUSE bug 1207845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212395">SUSE bug 1212395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213271">SUSE bug 1213271</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744746" comment="kernel-default-5.3.18-150300.59.115.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744747" comment="kernel-default-base-5.3.18-150300.59.115.2.150300.18.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009745026" comment="kernel-rt-5.3.18-150300.121.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230614" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0614</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0614" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0614" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0614" ref_url="https://www.suse.com/security/cve/CVE-2023-0614" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014245.html" source="SUSE-SU"/>
    <description>
    The fix in 4.6.16, 4.7.9, 4.8.4 and 4.9.7 for CVE-2018-10919 Confidential attribute disclosure vi LDAP filters was insufficient and an attacker may be able to obtain confidential BitLocker recovery keys from a Samba AD DC.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-30"/>
	<updated date="2023-06-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-0614/">CVE-2023-0614</cve>
	<bugzilla href="https://bugzilla.suse.com/1209485">SUSE bug 1209485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009751546" comment="libldb2-2.4.4-150300.3.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291435" comment="libldb2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009751559" comment="samba-client-libs-4.15.13+git.636.53d93c5b9d6-150300.3.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009666847" comment="samba-client-libs is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0687</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0687" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0687" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0687" ref_url="https://www.suse.com/security/cve/CVE-2023-0687" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1718-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3825-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031740.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** A vulnerability was found in GNU C Library 2.38. It has been declared as critical. This vulnerability affects the function __monstartup of the file gmon.c of the component Call Graph Monitor. The manipulation leads to buffer overflow. It is recommended to apply a patch to fix this issue. VDB-220246 is the identifier assigned to this vulnerability. NOTE: The real existence of this vulnerability is still doubted at the moment. The inputs that induce this vulnerability are basically addresses of the running application that is built with gmon enabled. It's basically trusted input or input that needs an actual security flaw to be compromised or controlled.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-04-01"/>
	<updated date="2023-09-28"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-0687/">CVE-2023-0687</cve>
	<bugzilla href="https://bugzilla.suse.com/1207975">SUSE bug 1207975</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009743626" comment="glibc-2.31-150300.46.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151368" comment="glibc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009743630" comment="glibc-locale-2.31-150300.46.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151373" comment="glibc-locale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009743631" comment="glibc-locale-base-2.31-150300.46.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251612" comment="glibc-locale-base is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0767</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0767" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0767" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0767" ref_url="https://www.suse.com/security/cve/CVE-2023-0767" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0434-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-February/027713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013965.html" source="SUSE-SU"/>
    <description>
    An attacker could construct a PKCS 12 cert bundle in such a way that could allow for arbitrary memory writes via PKCS 12 Safe Bag attributes being mishandled. This vulnerability affects Firefox &lt; 110, Thunderbird &lt; 102.8, and Firefox ESR &lt; 102.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-18"/>
	<updated date="2023-08-15"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0767/">CVE-2023-0767</cve>
	<bugzilla href="https://bugzilla.suse.com/1208138">SUSE bug 1208138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213200">SUSE bug 1213200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213818">SUSE bug 1213818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214271">SUSE bug 1214271</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009739389" comment="libfreebl3-3.79.4-150000.3.93.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009739391" comment="libfreebl3-hmac-3.79.4-150000.3.93.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244408" comment="libfreebl3-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009739393" comment="libsoftokn3-3.79.4-150000.3.93.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009739395" comment="libsoftokn3-hmac-3.79.4-150000.3.93.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244410" comment="libsoftokn3-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009739397" comment="mozilla-nss-3.79.4-150000.3.93.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009739399" comment="mozilla-nss-certs-3.79.4-150000.3.93.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009739404" comment="mozilla-nss-tools-3.79.4-150000.3.93.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0778</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0778" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0778" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0778" ref_url="https://www.suse.com/security/cve/CVE-2023-0778" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014735.html" source="SUSE-SU"/>
    <description>
    A Time-of-check Time-of-use (TOCTOU) flaw was found in podman. This issue may allow a malicious user to replace a normal file in a volume with a symlink while exporting the volume, allowing for access to arbitrary files on the host file system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-04-12"/>
	<updated date="2023-09-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-0778/">CVE-2023-0778</cve>
	<bugzilla href="https://bugzilla.suse.com/1208364">SUSE bug 1208364</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009752711" comment="podman-4.4.4-150300.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266791" comment="podman is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009752712" comment="podman-cni-config-4.4.4-150300.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266792" comment="podman-cni-config is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0922</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0922" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0922" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0922" ref_url="https://www.suse.com/security/cve/CVE-2023-0922" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1683-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1684-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014245.html" source="SUSE-SU"/>
    <description>
    The Samba AD DC administration tool, when operating against a remote LDAP server, will by default send new or reset passwords over a signed-only connection.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-30"/>
	<updated date="2023-06-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-0922/">CVE-2023-0922</cve>
	<bugzilla href="https://bugzilla.suse.com/1209481">SUSE bug 1209481</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009751546" comment="libldb2-2.4.4-150300.3.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291435" comment="libldb2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009751559" comment="samba-client-libs-4.15.13+git.636.53d93c5b9d6-150300.3.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009666847" comment="samba-client-libs is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1017</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1017" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1017" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1017" ref_url="https://www.suse.com/security/cve/CVE-2023-1017" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2051-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029030.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds write vulnerability exists in TPM2.0's Module Library allowing writing of a 2-byte data past the end of TPM2.0 command in the CryptParameterDecryption routine. An attacker who can successfully exploit this vulnerability can lead to denial of service (crashing the TPM chip/process or rendering it unusable) and/or arbitrary code execution in the TPM context.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-04-28"/>
	<updated date="2023-05-10"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1017/">CVE-2023-1017</cve>
	<bugzilla href="https://bugzilla.suse.com/1206022">SUSE bug 1206022</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009755648" comment="libtpms0-0.8.2-150300.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009632653" comment="libtpms0 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231018" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1018</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1018" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1018" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1018" ref_url="https://www.suse.com/security/cve/CVE-2023-1018" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2051-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029030.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read vulnerability exists in TPM2.0's Module Library allowing a 2-byte read past the end of a TPM2.0 command in the CryptParameterDecryption routine. An attacker who can successfully exploit this vulnerability can read or access sensitive data stored in the TPM.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-04-28"/>
	<updated date="2023-05-10"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-1018/">CVE-2023-1018</cve>
	<bugzilla href="https://bugzilla.suse.com/1206023">SUSE bug 1206023</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009755648" comment="libtpms0-0.8.2-150300.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009632653" comment="libtpms0 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1075</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1075" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1075" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1075" ref_url="https://www.suse.com/security/cve/CVE-2023-1075" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1800-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1811-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1892-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux Kernel. The tls_is_tx_ready() incorrectly checks for list emptiness, potentially accessing a type confused entry to the list_head, leaking the last byte of the confused field that overlaps with rec-&gt;tx_ready.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-04-12"/>
	<updated date="2023-07-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-1075/">CVE-2023-1075</cve>
	<bugzilla href="https://bugzilla.suse.com/1208598">SUSE bug 1208598</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009753636" comment="kernel-default-5.3.18-150300.59.118.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009753637" comment="kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009753815" comment="kernel-rt-5.3.18-150300.124.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1076</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1076" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1076" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1076" ref_url="https://www.suse.com/security/cve/CVE-2023-1076" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1800-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1801-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1803-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1811-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1848-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2232-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux Kernel. The tun/tap sockets have their socket UID hardcoded to 0 due to a type confusion in their initialization function. While it will be often correct, as tuntap devices require CAP_NET_ADMIN, it may not always be the case, e.g., a non-root user only having that capability. This would make tun/tap sockets being incorrectly treated in filtering/routing decisions, possibly bypassing network filters.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-17"/>
	<updated date="2023-08-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-1076/">CVE-2023-1076</cve>
	<bugzilla href="https://bugzilla.suse.com/1208599">SUSE bug 1208599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214019">SUSE bug 1214019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009753636" comment="kernel-default-5.3.18-150300.59.118.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009753637" comment="kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009745026" comment="kernel-rt-5.3.18-150300.121.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1078</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1078" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1078" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1078" ref_url="https://www.suse.com/security/cve/CVE-2023-1078" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1574-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1639-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1649-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1708-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1800-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1811-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1892-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux Kernel in RDS (Reliable Datagram Sockets) protocol. The rds_rm_zerocopy_callback() uses list_entry() on the head of a list causing a type confusion. Local user can trigger this with rds_message_put(). Type confusion leads to `struct rds_msg_zcopy_info *info` actually points to something else that is potentially controlled by local user. It is known how to trigger this, which causes an out of bounds access, and a lock corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-04-12"/>
	<updated date="2023-07-12"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1078/">CVE-2023-1078</cve>
	<bugzilla href="https://bugzilla.suse.com/1208601">SUSE bug 1208601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208603">SUSE bug 1208603</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009753636" comment="kernel-default-5.3.18-150300.59.118.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009753637" comment="kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009753815" comment="kernel-rt-5.3.18-150300.124.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1095</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1095" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1095" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1095" ref_url="https://www.suse.com/security/cve/CVE-2023-1095" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1800-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1801-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1803-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1811-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1848-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2232-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    In nf_tables_updtable, if nf_tables_table_enable returns an error, nft_trans_destroy is called to free the transaction object. nft_trans_destroy() calls list_del(), but the transaction was never placed on a list -- the list head is all zeroes, this results in a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-17"/>
	<updated date="2023-07-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1095/">CVE-2023-1095</cve>
	<bugzilla href="https://bugzilla.suse.com/1208777">SUSE bug 1208777</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009753636" comment="kernel-default-5.3.18-150300.59.118.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009753637" comment="kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009745026" comment="kernel-rt-5.3.18-150300.121.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1118</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1118" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1118" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1118" ref_url="https://www.suse.com/security/cve/CVE-2023-1118" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1972-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1973-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1975-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1981-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1982-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2024-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2031-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2043-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2232-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2506-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    A flaw use after free in the Linux kernel integrated infrared receiver/transceiver driver was found in the way user detaching rc device. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-17"/>
	<updated date="2023-08-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1118/">CVE-2023-1118</cve>
	<bugzilla href="https://bugzilla.suse.com/1208837">SUSE bug 1208837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208910">SUSE bug 1208910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210423">SUSE bug 1210423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211495">SUSE bug 1211495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213841">SUSE bug 1213841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213842">SUSE bug 1213842</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744746" comment="kernel-default-5.3.18-150300.59.115.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744747" comment="kernel-default-base-5.3.18-150300.59.115.2.150300.18.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009745026" comment="kernel-rt-5.3.18-150300.121.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1127</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1127" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1127" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1127" ref_url="https://www.suse.com/security/cve/CVE-2023-1127" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014763.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0781-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016039.html" source="SUSE-SU"/>
    <description>
    Divide By Zero in GitHub repository vim/vim prior to 9.0.1367.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-17"/>
	<updated date="2023-08-29"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-1127/">CVE-2023-1127</cve>
	<bugzilla href="https://bugzilla.suse.com/1208828">SUSE bug 1208828</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009755947" comment="vim-data-common-9.0.1443-150000.5.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009756067" comment="vim-small-9.0.1443-150000.5.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009755949" comment="xxd-9.0.1443-150000.5.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009756472" comment="xxd is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1170</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1170" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1170" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1170" ref_url="https://www.suse.com/security/cve/CVE-2023-1170" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0781-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029038.html" source="SUSE-SU"/>
    <description>
    Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1376.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-17"/>
	<updated date="2023-06-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-1170/">CVE-2023-1170</cve>
	<bugzilla href="https://bugzilla.suse.com/1208959">SUSE bug 1208959</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009743831" comment="vim-data-common-9.0.1386-150000.5.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009743853" comment="vim-small-9.0.1386-150000.5.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231175" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1175</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1175" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1175" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1175" ref_url="https://www.suse.com/security/cve/CVE-2023-1175" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0781-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029038.html" source="SUSE-SU"/>
    <description>
    Incorrect Calculation of Buffer Size in GitHub repository vim/vim prior to 9.0.1378.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-17"/>
	<updated date="2023-06-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-1175/">CVE-2023-1175</cve>
	<bugzilla href="https://bugzilla.suse.com/1208957">SUSE bug 1208957</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009743831" comment="vim-data-common-9.0.1386-150000.5.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009743853" comment="vim-small-9.0.1386-150000.5.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1195</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1195" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1195" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1195" ref_url="https://www.suse.com/security/cve/CVE-2023-1195" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014076.html" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in reconn_set_ipaddr_from_hostname in fs/cifs/connect.c in the Linux kernel. The issue occurs when it forgets to set the free pointer server-&gt;hostname to NULL, leading to an invalid pointer request.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-17"/>
	<updated date="2023-05-19"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-1195/">CVE-2023-1195</cve>
	<bugzilla href="https://bugzilla.suse.com/1208971">SUSE bug 1208971</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009745026" comment="kernel-rt-5.3.18-150300.121.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231264" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1264</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1264" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1264" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1264" ref_url="https://www.suse.com/security/cve/CVE-2023-1264" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014763.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016039.html" source="SUSE-SU"/>
    <description>
    NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.1392.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-05"/>
	<updated date="2023-08-29"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-1264/">CVE-2023-1264</cve>
	<bugzilla href="https://bugzilla.suse.com/1209042">SUSE bug 1209042</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009755947" comment="vim-data-common-9.0.1443-150000.5.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009756067" comment="vim-small-9.0.1443-150000.5.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009755949" comment="xxd-9.0.1443-150000.5.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009756472" comment="xxd is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231281" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1281</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1281" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1281" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1281" ref_url="https://www.suse.com/security/cve/CVE-2023-1281" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1800-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1801-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1802-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1803-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1811-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1848-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1892-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1992-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2369-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2371-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2376-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2399" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2405" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2415" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2416" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2423" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2425" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2431" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2448-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2453-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2455-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2459-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015114.html" source="SUSE-SU"/>
    <description>
    Use After Free vulnerability in Linux kernel traffic control index filter (tcindex) allows Privilege Escalation.?The imperfect hash area can be updated while packets are traversing, which will cause a use-after-free when 'tcf_exts_exec()' is called with the destroyed tcf_ext.?A local attacker user can use this vulnerability to elevate its privileges to root.
This issue affects Linux Kernel: from 4.14 before git commit ee059170b1f7e94e55fa6cadee544e176a6e59c2.


    </description>
<advisory from="security@suse.de">
	<issued date="2023-04-12"/>
	<updated date="2023-09-15"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1281/">CVE-2023-1281</cve>
	<bugzilla href="https://bugzilla.suse.com/1209634">SUSE bug 1209634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209683">SUSE bug 1209683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210335">SUSE bug 1210335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210423">SUSE bug 1210423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211833">SUSE bug 1211833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009753636" comment="kernel-default-5.3.18-150300.59.118.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009753637" comment="kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009753815" comment="kernel-rt-5.3.18-150300.124.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1355</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1355" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1355" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1355" ref_url="https://www.suse.com/security/cve/CVE-2023-1355" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014763.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016039.html" source="SUSE-SU"/>
    <description>
    NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.1402.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-05"/>
	<updated date="2023-08-29"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-1355/">CVE-2023-1355</cve>
	<bugzilla href="https://bugzilla.suse.com/1209187">SUSE bug 1209187</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009755947" comment="vim-data-common-9.0.1443-150000.5.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009756067" comment="vim-small-9.0.1443-150000.5.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009755949" comment="xxd-9.0.1443-150000.5.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009756472" comment="xxd is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1382</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1382" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1382" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1382" ref_url="https://www.suse.com/security/cve/CVE-2023-1382" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1800-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1811-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1892-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2500-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    A data race flaw was found in the Linux kernel, between where con is allocated and con-&gt;sock is set. This issue leads to a NULL pointer dereference when accessing con-&gt;sock-&gt;sk in net/tipc/topsrv.c in the tipc protocol in the Linux kernel.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-04-12"/>
	<updated date="2023-09-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1382/">CVE-2023-1382</cve>
	<bugzilla href="https://bugzilla.suse.com/1209288">SUSE bug 1209288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009753636" comment="kernel-default-5.3.18-150300.59.118.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009753637" comment="kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009753815" comment="kernel-rt-5.3.18-150300.124.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231390" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1390</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1390" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1390" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1390" ref_url="https://www.suse.com/security/cve/CVE-2023-1390" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1800-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1801-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1803-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1811-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1848-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1892-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2232-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2666-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015349.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2686-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2689-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2695-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2702-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2708-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2718-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2719-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2724-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2727-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015468.html" source="SUSE-SU"/>
    <description>
    A remote denial of service vulnerability was found in the Linux kernel’s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-04-12"/>
	<updated date="2023-07-12"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1390/">CVE-2023-1390</cve>
	<bugzilla href="https://bugzilla.suse.com/1209289">SUSE bug 1209289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210779">SUSE bug 1210779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211495">SUSE bug 1211495</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009753636" comment="kernel-default-5.3.18-150300.59.118.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009753637" comment="kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009753815" comment="kernel-rt-5.3.18-150300.124.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1513</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1513" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1513" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1513" ref_url="https://www.suse.com/security/cve/CVE-2023-1513" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1800-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1801-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1802-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1803-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1811-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1848-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1892-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1992-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2232-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2506-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    A flaw was found in KVM. When calling the KVM_GET_DEBUGREGS ioctl, on 32-bit systems, there might be some uninitialized portions of the kvm_debugregs structure that could be copied to userspace, causing an information leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-04-12"/>
	<updated date="2023-09-15"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-1513/">CVE-2023-1513</cve>
	<bugzilla href="https://bugzilla.suse.com/1209532">SUSE bug 1209532</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009753636" comment="kernel-default-5.3.18-150300.59.118.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009753637" comment="kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009753815" comment="kernel-rt-5.3.18-150300.124.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231582" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1582</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1582" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1582" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1582" ref_url="https://www.suse.com/security/cve/CVE-2023-1582" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1800-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1802-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1811-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1892-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1992-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    A race problem was found in fs/proc/task_mmu.c in the memory management sub-component in the Linux kernel. This issue may allow a local attacker with user privilege to cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-04-12"/>
	<updated date="2023-09-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1582/">CVE-2023-1582</cve>
	<bugzilla href="https://bugzilla.suse.com/1209636">SUSE bug 1209636</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009753636" comment="kernel-default-5.3.18-150300.59.118.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009753637" comment="kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009753815" comment="kernel-rt-5.3.18-150300.124.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1981</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1981" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1981" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1981" ref_url="https://www.suse.com/security/cve/CVE-2023-1981" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1993-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1994-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028978.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in the avahi library. This flaw allows an unprivileged user to make a dbus call, causing the avahi daemon to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-04-26"/>
	<updated date="2023-06-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1981/">CVE-2023-1981</cve>
	<bugzilla href="https://bugzilla.suse.com/1210328">SUSE bug 1210328</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009754604" comment="avahi-0.7-150100.3.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151208" comment="avahi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009754605" comment="libavahi-client3-0.7-150100.3.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151212" comment="libavahi-client3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009754606" comment="libavahi-common3-0.7-150100.3.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151214" comment="libavahi-common3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009754607" comment="libavahi-core7-0.7-150100.3.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151216" comment="libavahi-core7 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202322809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-22809</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-22809" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22809" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-22809" ref_url="https://www.suse.com/security/cve/CVE-2023-22809" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013484.html" source="SUSE-SU"/>
    <description>
    In Sudo before 1.9.12p2, the sudoedit (aka -e) feature mishandles extra arguments passed in the user-provided environment variables (SUDO_EDITOR, VISUAL, and EDITOR), allowing a local attacker to append arbitrary entries to the list of files to process. This can lead to privilege escalation. Affected versions are 1.8.0 through 1.9.12.p1. The problem exists because a user-specified editor may contain a "--" argument that defeats a protection mechanism, e.g., an EDITOR='vim -- /path/to/extra/file' value.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-01-21"/>
	<updated date="2023-03-18"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-22809/">CVE-2023-22809</cve>
	<bugzilla href="https://bugzilla.suse.com/1207082">SUSE bug 1207082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208053">SUSE bug 1208053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209326">SUSE bug 1209326</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009733701" comment="sudo-1.9.5p2-150300.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151407" comment="sudo is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202322995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-22995</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-22995" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22995" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-22995" ref_url="https://www.suse.com/security/cve/CVE-2023-22995" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028529.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.17, an error path in dwc3_qcom_acpi_register_core in drivers/usb/dwc3/dwc3-qcom.c lacks certain platform_device_put and kfree calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-17"/>
	<updated date="2023-06-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-22995/">CVE-2023-22995</cve>
	<bugzilla href="https://bugzilla.suse.com/1208741">SUSE bug 1208741</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744746" comment="kernel-default-5.3.18-150300.59.115.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744747" comment="kernel-default-base-5.3.18-150300.59.115.2.150300.18.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009745026" comment="kernel-rt-5.3.18-150300.121.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202322998" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-22998</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-22998" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22998" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-22998" ref_url="https://www.suse.com/security/cve/CVE-2023-22998" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 6.0.3, drivers/gpu/drm/virtio/virtgpu_object.c misinterprets the drm_gem_shmem_get_sg_table return value (expects it to be NULL in the error case, whereas it is actually an error pointer).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-17"/>
	<updated date="2023-07-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-22998/">CVE-2023-22998</cve>
	<bugzilla href="https://bugzilla.suse.com/1208776">SUSE bug 1208776</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744746" comment="kernel-default-5.3.18-150300.59.115.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744747" comment="kernel-default-base-5.3.18-150300.59.115.2.150300.18.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009745026" comment="kernel-rt-5.3.18-150300.121.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202323000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-23000</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-23000" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23000" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-23000" ref_url="https://www.suse.com/security/cve/CVE-2023-23000" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.17, drivers/phy/tegra/xusb.c mishandles the tegra_xusb_find_port_node return value. Callers expect NULL in the error case, but an error pointer is used.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-17"/>
	<updated date="2023-07-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-23000/">CVE-2023-23000</cve>
	<bugzilla href="https://bugzilla.suse.com/1208816">SUSE bug 1208816</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744746" comment="kernel-default-5.3.18-150300.59.115.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744747" comment="kernel-default-base-5.3.18-150300.59.115.2.150300.18.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009745026" comment="kernel-rt-5.3.18-150300.121.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202323004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-23004</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-23004" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23004" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-23004" ref_url="https://www.suse.com/security/cve/CVE-2023-23004" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1800-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1811-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.19, drivers/gpu/drm/arm/malidp_planes.c misinterprets the get_sg_table return value (expects it to be NULL in the error case, whereas it is actually an error pointer).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-17"/>
	<updated date="2023-07-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-23004/">CVE-2023-23004</cve>
	<bugzilla href="https://bugzilla.suse.com/1208843">SUSE bug 1208843</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009753636" comment="kernel-default-5.3.18-150300.59.118.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009753637" comment="kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009745026" comment="kernel-rt-5.3.18-150300.121.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202323006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-23006</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-23006" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23006" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-23006" ref_url="https://www.suse.com/security/cve/CVE-2023-23006" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2140-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2141-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2231-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.15.13, drivers/net/ethernet/mellanox/mlx5/core/steering/dr_domain.c misinterprets the mlx5_get_uars_page return value (expects it to be NULL in the error case, whereas it is actually an error pointer).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-17"/>
	<updated date="2023-09-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-23006/">CVE-2023-23006</cve>
	<bugzilla href="https://bugzilla.suse.com/1208845">SUSE bug 1208845</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744746" comment="kernel-default-5.3.18-150300.59.115.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744747" comment="kernel-default-base-5.3.18-150300.59.115.2.150300.18.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009745026" comment="kernel-rt-5.3.18-150300.121.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202323454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-23454</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-23454" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-23454" ref_url="https://www.suse.com/security/cve/CVE-2023-23454" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1801-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1803-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1848-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2232-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2367-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2368-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2369-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2371-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2376-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2385-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2399" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2401" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2405" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2413" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2420" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2422" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2423" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2425" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2428" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2429" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2431" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2448-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2450-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2453-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2455-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2459-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2506-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
    <description>
    cbq_classify in net/sched/sch_cbq.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service (slab-out-of-bounds read) because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-01-26"/>
	<updated date="2023-07-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-23454/">CVE-2023-23454</cve>
	<bugzilla href="https://bugzilla.suse.com/1207036">SUSE bug 1207036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207188">SUSE bug 1207188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208030">SUSE bug 1208030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208044">SUSE bug 1208044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208085">SUSE bug 1208085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211833">SUSE bug 1211833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009735606" comment="kernel-default-5.3.18-150300.59.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009735607" comment="kernel-default-base-5.3.18-150300.59.109.1.150300.18.62.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009742406" comment="kernel-rt-5.3.18-150300.118.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202323455" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-23455</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-23455" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-23455" ref_url="https://www.suse.com/security/cve/CVE-2023-23455" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1801-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1803-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1848-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2232-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2506-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2686-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2695-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2702-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2708-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2714-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2718-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2727-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2735-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2755-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
    <description>
    atm_tc_enqueue in net/sched/sch_atm.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-01-26"/>
	<updated date="2023-07-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-23455/">CVE-2023-23455</cve>
	<bugzilla href="https://bugzilla.suse.com/1207125">SUSE bug 1207125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207189">SUSE bug 1207189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211833">SUSE bug 1211833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009735606" comment="kernel-default-5.3.18-150300.59.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009735607" comment="kernel-default-base-5.3.18-150300.59.109.1.150300.18.62.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009742406" comment="kernel-rt-5.3.18-150300.118.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202323559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-23559</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-23559" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23559" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-23559" ref_url="https://www.suse.com/security/cve/CVE-2023-23559" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0767-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2506-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029875.html" source="SUSE-SU"/>
    <description>
    In rndis_query_oid in drivers/net/wireless/rndis_wlan.c in the Linux kernel through 6.1.5, there is an integer overflow in an addition.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-17"/>
	<updated date="2023-06-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2023-23559/">CVE-2023-23559</cve>
	<bugzilla href="https://bugzilla.suse.com/1207051">SUSE bug 1207051</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744746" comment="kernel-default-5.3.18-150300.59.115.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744747" comment="kernel-default-base-5.3.18-150300.59.115.2.150300.18.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009745026" comment="kernel-rt-5.3.18-150300.121.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202323916" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-23916</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-23916" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23916" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-23916" ref_url="https://www.suse.com/security/cve/CVE-2023-23916" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1711-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2226-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2228-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029437.html" source="SUSE-SU"/>
    <description>
    An allocation of resources without limits or throttling vulnerability exists in curl &lt;v7.88.0 based on the "chained" HTTP compression algorithms, meaning that a server response can be compressed multiple times and potentially with differentalgorithms. The number of acceptable "links" in this "decompression chain" wascapped, but the cap was implemented on a per-header basis allowing a maliciousserver to insert a virtually unlimited number of compression steps simply byusing many headers. The use of such a decompression chain could result in a "malloc bomb", making curl end up spending enormous amounts of allocated heap memory, or trying to and returning out of memory errors.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-04-01"/>
	<updated date="2023-06-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-23916/">CVE-2023-23916</cve>
	<bugzilla href="https://bugzilla.suse.com/1207992">SUSE bug 1207992</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009748284" comment="curl-7.66.0-150200.4.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009748285" comment="libcurl4-7.66.0-150200.4.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202323931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-23931</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-23931" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23931" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-23931" ref_url="https://www.suse.com/security/cve/CVE-2023-23931" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0722-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1767-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2144-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014901.html" source="SUSE-SU"/>
    <description>
    cryptography is a package designed to expose cryptographic primitives and recipes to Python developers. In affected versions `Cipher.update_into` would accept Python objects which implement the buffer protocol, but provide only immutable buffers. This would allow immutable objects (such as `bytes`) to be mutated, thus violating fundamental rules of Python and resulting in corrupted output. This now correctly raises an exception. This issue has been present since `update_into` was originally introduced in cryptography 1.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-04-05"/>
	<updated date="2023-09-19"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-23931/">CVE-2023-23931</cve>
	<bugzilla href="https://bugzilla.suse.com/1208036">SUSE bug 1208036</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009743778" comment="python3-cryptography-3.3.2-150200.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238251" comment="python3-cryptography is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202324329" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-24329</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-24329" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24329" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-24329" ref_url="https://www.suse.com/security/cve/CVE-2023-24329" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0868-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2639-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015621.html" source="SUSE-SU"/>
    <description>
    An issue in the urllib.parse component of Python before 3.11.4 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-23"/>
	<updated date="2023-08-02"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-24329/">CVE-2023-24329</cve>
	<bugzilla href="https://bugzilla.suse.com/1208471">SUSE bug 1208471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213553">SUSE bug 1213553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213554">SUSE bug 1213554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213839">SUSE bug 1213839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009747016" comment="libpython3_6m1_0-3.6.15-150300.10.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009747017" comment="python3-3.6.15-150300.10.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009747018" comment="python3-base-3.6.15-150300.10.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202324593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-24593</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-24593" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24593" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-24593" ref_url="https://www.suse.com/security/cve/CVE-2023-24593" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1910-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014674.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** Rejected by upstream.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-04-29"/>
	<updated date="2023-07-21"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-24593/">CVE-2023-24593</cve>
	<bugzilla href="https://bugzilla.suse.com/1209714">SUSE bug 1209714</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009755563" comment="glib2-tools-2.62.6-150200.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151144" comment="glib2-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009755564" comment="libgio-2_0-0-2.62.6-150200.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151145" comment="libgio-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009755565" comment="libglib-2_0-0-2.62.6-150200.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151147" comment="libglib-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009755566" comment="libgmodule-2_0-0-2.62.6-150200.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151149" comment="libgmodule-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009755567" comment="libgobject-2_0-0-2.62.6-150200.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151151" comment="libgobject-2_0-0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202325012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-25012</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-25012" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25012" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-25012" ref_url="https://www.suse.com/security/cve/CVE-2023-25012" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1800-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1811-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    The Linux kernel through 6.1.9 has a Use-After-Free in bigben_remove in drivers/hid/hid-bigbenff.c via a crafted USB device because the LED controllers remain registered for too long.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-17"/>
	<updated date="2023-07-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-25012/">CVE-2023-25012</cve>
	<bugzilla href="https://bugzilla.suse.com/1207560">SUSE bug 1207560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207846">SUSE bug 1207846</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009753636" comment="kernel-default-5.3.18-150300.59.118.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009753637" comment="kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009745026" comment="kernel-rt-5.3.18-150300.121.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202325153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-25153</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-25153" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25153" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-25153" ref_url="https://www.suse.com/security/cve/CVE-2023-25153" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014726.html" source="SUSE-SU"/>
    <description>
    containerd is an open source container runtime. Before versions 1.6.18 and 1.5.18, when importing an OCI image, there was no limit on the number of bytes read for certain files. A maliciously crafted image with a large file where a limit was not applied could cause a denial of service. This bug has been fixed in containerd 1.6.18 and 1.5.18. Users should update to these versions to resolve the issue. As a workaround, ensure that only trusted images are used and that only trusted users have permissions to import images.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-04-14"/>
	<updated date="2023-06-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-25153/">CVE-2023-25153</cve>
	<bugzilla href="https://bugzilla.suse.com/1208423">SUSE bug 1208423</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009752241" comment="containerd-1.6.19-150000.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153864" comment="containerd is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202325173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-25173</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-25173" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25173" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-25173" ref_url="https://www.suse.com/security/cve/CVE-2023-25173" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014726.html" source="SUSE-SU"/>
    <description>
    containerd is an open source container runtime. A bug was found in containerd prior to versions 1.6.18 and 1.5.18 where supplementary groups are not set up properly inside a container. If an attacker has direct access to a container and manipulates their supplementary group access, they may be able to use supplementary group access to bypass primary group restrictions in some cases, potentially gaining access to sensitive information or gaining the ability to execute code in that container. Downstream applications that use the containerd client library may be affected as well.

This bug has been fixed in containerd v1.6.18 and v.1.5.18. Users should update to these versions and recreate containers to resolve this issue. Users who rely on a downstream application that uses containerd's client library should check that application for a separate advisory and instructions. As a workaround, ensure that the `"USER $USERNAME"` Dockerfile instruction is not used. Instead, set the container entrypoint to a value similar to `ENTRYPOINT ["su", "-", "user"]` to allow `su` to properly set up supplementary groups.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-04-14"/>
	<updated date="2023-09-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-25173/">CVE-2023-25173</cve>
	<bugzilla href="https://bugzilla.suse.com/1208426">SUSE bug 1208426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215588">SUSE bug 1215588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009752241" comment="containerd-1.6.19-150000.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153864" comment="containerd is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202325180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-25180</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-25180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25180" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-25180" ref_url="https://www.suse.com/security/cve/CVE-2023-25180" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1910-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014674.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** Rejected by upstream.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-04-29"/>
	<updated date="2023-07-21"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-25180/">CVE-2023-25180</cve>
	<bugzilla href="https://bugzilla.suse.com/1209713">SUSE bug 1209713</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009755563" comment="glib2-tools-2.62.6-150200.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151144" comment="glib2-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009755564" comment="libgio-2_0-0-2.62.6-150200.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151145" comment="libgio-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009755565" comment="libglib-2_0-0-2.62.6-150200.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151147" comment="libglib-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009755566" comment="libgmodule-2_0-0-2.62.6-150200.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151149" comment="libgmodule-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009755567" comment="libgobject-2_0-0-2.62.6-150200.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151151" comment="libgobject-2_0-0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202325193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-25193</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-25193" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25193" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-25193" ref_url="https://www.suse.com/security/cve/CVE-2023-25193" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1852-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3406-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016025.html" source="SUSE-SU"/>
    <description>
    hb-ot-layout-gsubgpos.hh in HarfBuzz through 6.0.0 allows attackers to trigger O(n^2) growth via consecutive marks during the process of looking back for base glyphs when attaching marks.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-04-13"/>
	<updated date="2023-08-29"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-25193/">CVE-2023-25193</cve>
	<bugzilla href="https://bugzilla.suse.com/1207922">SUSE bug 1207922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213939">SUSE bug 1213939</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009753275" comment="libharfbuzz0-2.6.4-150200.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153263" comment="libharfbuzz0 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202325809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-25809</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-25809" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25809" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-25809" ref_url="https://www.suse.com/security/cve/CVE-2023-25809" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1726-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2003-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028987.html" source="SUSE-SU"/>
    <description>
    runc is a CLI tool for spawning and running containers according to the OCI specification. In affected versions it was found that rootless runc makes `/sys/fs/cgroup` writable in following conditons: 1. when runc is executed inside the user namespace, and the `config.json` does not specify the cgroup namespace to be unshared (e.g.., `(docker|podman|nerdctl) run --cgroupns=host`, with Rootless Docker/Podman/nerdctl) or 2. when runc is executed outside the user namespace, and `/sys` is mounted with `rbind, ro` (e.g., `runc spec --rootless`; this condition is very rare). A container may gain the write access to user-owned cgroup hierarchy `/sys/fs/cgroup/user.slice/...` on the host . Other users's cgroup hierarchies are not affected. Users are advised to upgrade to version 1.1.5. Users unable to upgrade may unshare the cgroup namespace (`(docker|podman|nerdctl) run --cgroupns=private)`. This is the default behavior of Docker/Podman/nerdctl on cgroup v2 hosts. or add `/sys/fs/cgroup` to `maskedPaths`.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-04-26"/>
	<updated date="2023-09-15"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-25809/">CVE-2023-25809</cve>
	<bugzilla href="https://bugzilla.suse.com/1209884">SUSE bug 1209884</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009752713" comment="runc-1.1.5-150000.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153867" comment="runc is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202326545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-26545</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-26545" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26545" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-26545" ref_url="https://www.suse.com/security/cve/CVE-2023-26545" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0767-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1574-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1619-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1639-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1640-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1649-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1654-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1708-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 6.1.13, there is a double free in net/mpls/af_mpls.c upon an allocation failure (for registering the sysctl table under a new location) during the renaming of a device.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-17"/>
	<updated date="2023-07-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-26545/">CVE-2023-26545</cve>
	<bugzilla href="https://bugzilla.suse.com/1208700">SUSE bug 1208700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208909">SUSE bug 1208909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210423">SUSE bug 1210423</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744746" comment="kernel-default-5.3.18-150300.59.115.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744747" comment="kernel-default-base-5.3.18-150300.59.115.2.150300.18.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009745026" comment="kernel-rt-5.3.18-150300.121.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202327371" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-27371</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-27371" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27371" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-27371" ref_url="https://www.suse.com/security/cve/CVE-2023-27371" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:1686-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1686-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014542.html" source="SUSE-SU"/>
    <description>
    GNU libmicrohttpd before 0.9.76 allows remote DoS (Denial of Service) due to improper parsing of a multipart/form-data boundary in the postprocessor.c MHD_create_post_processor() method. This allows an attacker to remotely send a malicious HTTP POST packet that includes one or more '\0' bytes in a multipart/form-data boundary field, which - assuming a specific heap layout - will result in an out-of-bounds read and a crash in the find_boundary() function.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-30"/>
	<updated date="2023-04-28"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-27371/">CVE-2023-27371</cve>
	<bugzilla href="https://bugzilla.suse.com/1208745">SUSE bug 1208745</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009742932" comment="libmicrohttpd12-0.9.57-150000.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009751539" comment="libmicrohttpd12 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202327533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-27533</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-27533" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27533" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-27533" ref_url="https://www.suse.com/security/cve/CVE-2023-27533" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1582-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1711-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2226-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2228-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029437.html" source="SUSE-SU"/>
    <description>
    A vulnerability in input validation exists in curl &lt;8.0 during communication using the TELNET protocol may allow an attacker to pass on maliciously crafted user name and "telnet options" during server negotiation. The lack of proper input scrubbing allows an attacker to send content or perform option negotiation without the application's intent. This vulnerability could be exploited if an application allows user input, thereby enabling attackers to execute arbitrary code on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-04-01"/>
	<updated date="2023-06-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-27533/">CVE-2023-27533</cve>
	<bugzilla href="https://bugzilla.suse.com/1209209">SUSE bug 1209209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009748284" comment="curl-7.66.0-150200.4.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009748285" comment="libcurl4-7.66.0-150200.4.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202327534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-27534</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-27534" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27534" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-27534" ref_url="https://www.suse.com/security/cve/CVE-2023-27534" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1582-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1711-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2226-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2228-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029437.html" source="SUSE-SU"/>
    <description>
    A path traversal vulnerability exists in curl &lt;8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user's home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-04-01"/>
	<updated date="2023-06-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-27534/">CVE-2023-27534</cve>
	<bugzilla href="https://bugzilla.suse.com/1209210">SUSE bug 1209210</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009748284" comment="curl-7.66.0-150200.4.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009748285" comment="libcurl4-7.66.0-150200.4.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202327535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-27535</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-27535" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27535" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-27535" ref_url="https://www.suse.com/security/cve/CVE-2023-27535" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1582-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1711-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2226-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2228-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029437.html" source="SUSE-SU"/>
    <description>
    An authentication bypass vulnerability exists in libcurl &lt;8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if they match the current setup. However, certain FTP settings such as CURLOPT_FTP_ACCOUNT, CURLOPT_FTP_ALTERNATIVE_TO_USER, CURLOPT_FTP_SSL_CCC, and CURLOPT_USE_SSL were not included in the configuration match checks, causing them to match too easily. This could lead to libcurl using the wrong credentials when performing a transfer, potentially allowing unauthorized access to sensitive information.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-04-01"/>
	<updated date="2023-06-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-27535/">CVE-2023-27535</cve>
	<bugzilla href="https://bugzilla.suse.com/1209211">SUSE bug 1209211</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009748284" comment="curl-7.66.0-150200.4.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009748285" comment="libcurl4-7.66.0-150200.4.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202327536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-27536</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-27536" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27536" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-27536" ref_url="https://www.suse.com/security/cve/CVE-2023-27536" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1582-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1711-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2226-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2228-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029437.html" source="SUSE-SU"/>
    <description>
    An authentication bypass vulnerability exists libcurl &lt;8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-04-01"/>
	<updated date="2023-06-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-27536/">CVE-2023-27536</cve>
	<bugzilla href="https://bugzilla.suse.com/1209212">SUSE bug 1209212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009748284" comment="curl-7.66.0-150200.4.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009748285" comment="libcurl4-7.66.0-150200.4.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202327538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-27538</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-27538" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27538" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-27538" ref_url="https://www.suse.com/security/cve/CVE-2023-27538" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1582-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1711-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2226-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2228-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029437.html" source="SUSE-SU"/>
    <description>
    An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-04-01"/>
	<updated date="2023-06-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-27538/">CVE-2023-27538</cve>
	<bugzilla href="https://bugzilla.suse.com/1209214">SUSE bug 1209214</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009748284" comment="curl-7.66.0-150200.4.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009748285" comment="libcurl4-7.66.0-150200.4.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202327561" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-27561</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-27561" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27561" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-27561" ref_url="https://www.suse.com/security/cve/CVE-2023-27561" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1726-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2003-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028987.html" source="SUSE-SU"/>
    <description>
    runc through 1.1.4 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images. NOTE: this issue exists because of a CVE-2019-19921 regression.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-04-26"/>
	<updated date="2023-09-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-27561/">CVE-2023-27561</cve>
	<bugzilla href="https://bugzilla.suse.com/1208962">SUSE bug 1208962</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009752713" comment="runc-1.1.5-150000.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153867" comment="runc is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202328327" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-28327</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-28327" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28327" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-28327" ref_url="https://www.suse.com/security/cve/CVE-2023-28327" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1800-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1802-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1811-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1892-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1992-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference flaw was found in the UNIX protocol in net/unix/diag.c In unix_diag_get_exact in the Linux Kernel. The newly allocated skb does not have sk, leading to a NULL pointer. This flaw allows a local user to crash or potentially cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-04-12"/>
	<updated date="2023-09-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-28327/">CVE-2023-28327</cve>
	<bugzilla href="https://bugzilla.suse.com/1209290">SUSE bug 1209290</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009753636" comment="kernel-default-5.3.18-150300.59.118.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009753637" comment="kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009753815" comment="kernel-rt-5.3.18-150300.124.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202328328" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-28328</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-28328" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28328" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-28328" ref_url="https://www.suse.com/security/cve/CVE-2023-28328" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1800-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1801-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1803-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1811-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1848-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1892-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2232-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2506-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015468.html" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference flaw was found in the az6027 driver in drivers/media/usb/dev-usb/az6027.c in the Linux Kernel. The message from user space is not checked properly before transferring into the device. This flaw allows a local user to crash the system or potentially cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-04-12"/>
	<updated date="2023-07-12"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-28328/">CVE-2023-28328</cve>
	<bugzilla href="https://bugzilla.suse.com/1209291">SUSE bug 1209291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009753636" comment="kernel-default-5.3.18-150300.59.118.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009753637" comment="kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009753815" comment="kernel-rt-5.3.18-150300.124.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202328450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-28450</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-28450" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28450" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-28450" ref_url="https://www.suse.com/security/cve/CVE-2023-28450" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:1930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014781.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Dnsmasq before 2.90. The default maximum EDNS.0 UDP packet size was set to 4096 but should be 1232 because of DNS Flag Day 2020.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-04-21"/>
	<updated date="2023-05-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-28450/">CVE-2023-28450</cve>
	<bugzilla href="https://bugzilla.suse.com/1209358">SUSE bug 1209358</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009752242" comment="dnsmasq-2.86-150100.7.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152784" comment="dnsmasq is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202328464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-28464</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-28464" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28464" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-28464" ref_url="https://www.suse.com/security/cve/CVE-2023-28464" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1800-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1801-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1802-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1803-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1811-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1848-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1892-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1992-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2232-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2369-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2371-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2376-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2399" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2405" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2415" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2416" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2420" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2422" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2423" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2425" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2431" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2448-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2453-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2455-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2459-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    hci_conn_cleanup in net/bluetooth/hci_conn.c in the Linux kernel through 6.2.9 has a use-after-free (observed in hci_conn_hash_flush) because of calls to hci_dev_put and hci_conn_put. There is a double free that may lead to privilege escalation.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-04-12"/>
	<updated date="2023-09-15"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-28464/">CVE-2023-28464</cve>
	<bugzilla href="https://bugzilla.suse.com/1209052">SUSE bug 1209052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211111">SUSE bug 1211111</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009753636" comment="kernel-default-5.3.18-150300.59.118.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009753637" comment="kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009753815" comment="kernel-rt-5.3.18-150300.124.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202328466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-28466</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-28466" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28466" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-28466" ref_url="https://www.suse.com/security/cve/CVE-2023-28466" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1800-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1802-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1811-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1892-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1992-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2501-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2507-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2534-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2538-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015349.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2686-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2687-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2689-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2695-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2697-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2702-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2703-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2714-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2718-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2719-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2724-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2727-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2735-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2755-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
    <description>
    do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-04-12"/>
	<updated date="2023-09-15"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-28466/">CVE-2023-28466</cve>
	<bugzilla href="https://bugzilla.suse.com/1209366">SUSE bug 1209366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210452">SUSE bug 1210452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211833">SUSE bug 1211833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213841">SUSE bug 1213841</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009753636" comment="kernel-default-5.3.18-150300.59.118.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009753637" comment="kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009753815" comment="kernel-rt-5.3.18-150300.124.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202328484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-28484</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-28484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28484" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-28484" ref_url="https://www.suse.com/security/cve/CVE-2023-28484" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014644.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2053-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2054-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016187.html" source="SUSE-SU"/>
    <description>
    In libxml2 before 2.10.4, parsing of certain invalid XSD schemas can lead to a NULL pointer dereference and subsequently a segfault. This occurs in xmlSchemaFixupComplexType in xmlschemas.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-04-27"/>
	<updated date="2023-09-26"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-28484/">CVE-2023-28484</cve>
	<bugzilla href="https://bugzilla.suse.com/1210411">SUSE bug 1210411</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009755256" comment="libxml2-2-2.9.7-150000.3.57.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151137" comment="libxml2-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009755259" comment="libxml2-tools-2.9.7-150000.3.57.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151140" comment="libxml2-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009755260" comment="python3-libxml2-python-2.9.7-150000.3.57.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177126" comment="python3-libxml2-python is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202328486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-28486</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-28486" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28486" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-28486" ref_url="https://www.suse.com/security/cve/CVE-2023-28486" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1665-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1698-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1699-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1700-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028499.html" source="SUSE-SU"/>
    <description>
    Sudo before 1.9.13 does not escape control characters in log messages.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-31"/>
	<updated date="2023-06-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-28486/">CVE-2023-28486</cve>
	<bugzilla href="https://bugzilla.suse.com/1209362">SUSE bug 1209362</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009750787" comment="sudo-1.9.5p2-150300.3.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151407" comment="sudo is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202328487" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-28487</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-28487" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28487" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-28487" ref_url="https://www.suse.com/security/cve/CVE-2023-28487" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1665-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1698-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1699-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1700-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028499.html" source="SUSE-SU"/>
    <description>
    Sudo before 1.9.13 does not escape control characters in sudoreplay output.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-31"/>
	<updated date="2023-06-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-28487/">CVE-2023-28487</cve>
	<bugzilla href="https://bugzilla.suse.com/1209361">SUSE bug 1209361</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009750787" comment="sudo-1.9.5p2-150300.3.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151407" comment="sudo is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202328642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-28642</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-28642" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28642" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-28642" ref_url="https://www.suse.com/security/cve/CVE-2023-28642" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1726-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2003-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028987.html" source="SUSE-SU"/>
    <description>
    runc is a CLI tool for spawning and running containers according to the OCI specification. It was found that AppArmor can be bypassed when `/proc` inside the container is symlinked with a specific mount configuration. This issue has been fixed in runc version 1.1.5, by prohibiting symlinked `/proc`. See PR #3785 for details. users are advised to upgrade. Users unable to upgrade should avoid using an untrusted container image.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-04-26"/>
	<updated date="2023-09-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-28642/">CVE-2023-28642</cve>
	<bugzilla href="https://bugzilla.suse.com/1209888">SUSE bug 1209888</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009752713" comment="runc-1.1.5-150000.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153867" comment="runc is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202328772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-28772</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-28772" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28772" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-28772" ref_url="https://www.suse.com/security/cve/CVE-2023-28772" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1800-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1801-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1803-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1811-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1848-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1892-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2232-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015468.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.13.3. lib/seq_buf.c has a seq_buf_putmem_hex buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-04-12"/>
	<updated date="2023-08-19"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-28772/">CVE-2023-28772</cve>
	<bugzilla href="https://bugzilla.suse.com/1209549">SUSE bug 1209549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211110">SUSE bug 1211110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214378">SUSE bug 1214378</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009753636" comment="kernel-default-5.3.18-150300.59.118.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009753637" comment="kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009753815" comment="kernel-rt-5.3.18-150300.124.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202329383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-29383</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-29383" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29383" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-29383" ref_url="https://www.suse.com/security/cve/CVE-2023-29383" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014666.html" source="SUSE-SU"/>
    <description>
    In Shadow 4.13, it is possible to inject control characters into fields provided to the SUID program chfn (change finger). Although it is not possible to exploit this directly (e.g., adding a new user fails because \n is in the block list), it is possible to misrepresent the /etc/passwd file when viewed. Use of \r manipulations and Unicode characters to work around blocking of the : character make it possible to give the impression that a new user has been added. In other words, an adversary may be able to convince a system administrator to take the system offline (an indirect, social-engineered denial of service) by demonstrating that "cat /etc/passwd" shows a rogue user account.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-04-29"/>
	<updated date="2023-07-21"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-29383/">CVE-2023-29383</cve>
	<bugzilla href="https://bugzilla.suse.com/1210507">SUSE bug 1210507</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009754854" comment="login_defs-4.8.1-150300.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670997" comment="login_defs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009754855" comment="shadow-4.8.1-150300.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166874" comment="shadow is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202329469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-29469</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-29469" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29469" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-29469" ref_url="https://www.suse.com/security/cve/CVE-2023-29469" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014644.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2053-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2054-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016187.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in libxml2 before 2.10.4. When hashing empty dict strings in a crafted XML document, xmlDictComputeFastKey in dict.c can produce non-deterministic values, leading to various logic and memory errors, such as a double free. This behavior occurs because there is an attempt to use the first byte of an empty string, and any value is possible (not solely the '\0' value).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-04-27"/>
	<updated date="2023-09-26"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-29469/">CVE-2023-29469</cve>
	<bugzilla href="https://bugzilla.suse.com/1210412">SUSE bug 1210412</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009755256" comment="libxml2-2-2.9.7-150000.3.57.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151137" comment="libxml2-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009755259" comment="libxml2-tools-2.9.7-150000.3.57.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151140" comment="libxml2-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009755260" comment="python3-libxml2-python-2.9.7-150000.3.57.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177126" comment="python3-libxml2-python is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202330630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-30630</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-30630" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30630" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-30630" ref_url="https://www.suse.com/security/cve/CVE-2023-30630" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2215-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029418.html" source="SUSE-SU"/>
    <description>
    Dmidecode before 3.5 allows -dump-bin to overwrite a local file. This has security relevance because, for example, execution of Dmidecode via Sudo is plausible.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-17"/>
	<updated date="2023-06-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-30630/">CVE-2023-30630</cve>
	<bugzilla href="https://bugzilla.suse.com/1210418">SUSE bug 1210418</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705465" comment="openSUSE Leap Micro 5.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009754961" comment="dmidecode-3.2-150100.9.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009755043" comment="dmidecode is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
</definitions>
<tests>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711319" version="1" comment="kernel-default is ==3.12.38-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711320" version="1" comment="kgraft-patch-3_12_38-44-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711323" version="1" comment="kernel-default is ==3.12.39-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711324" version="1" comment="kgraft-patch-3_12_39-47-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711326" version="1" comment="kernel-default is ==3.12.43-52.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711327" version="1" comment="kgraft-patch-3_12_43-52_6-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711329" version="1" comment="kernel-default is ==3.12.44-52.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711330" version="1" comment="kgraft-patch-3_12_44-52_10-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711332" version="1" comment="kernel-default is ==3.12.44-52.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711333" version="1" comment="kgraft-patch-3_12_44-52_18-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711335" version="1" comment="kernel-default is ==3.12.48-52.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711336" version="1" comment="kgraft-patch-3_12_48-52_27-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714891" version="1" comment="kernel-default is ==3.12.49-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711338" version="1" comment="kgraft-patch-3_12_49-11-default is &gt;=5-14.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711340" version="1" comment="kernel-default is ==3.12.51-52.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711341" version="1" comment="kgraft-patch-3_12_51-52_31-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711343" version="1" comment="kernel-default is ==3.12.51-52.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711344" version="1" comment="kgraft-patch-3_12_51-52_34-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711346" version="1" comment="kernel-default is ==3.12.51-52.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711347" version="1" comment="kgraft-patch-3_12_51-52_39-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711349" version="1" comment="kernel-default is ==3.12.51-60.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711350" version="1" comment="kgraft-patch-3_12_51-60_20-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711352" version="1" comment="kernel-default is ==3.12.51-60.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711353" version="1" comment="kgraft-patch-3_12_51-60_25-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711355" version="1" comment="kernel-default is ==3.12.53-60.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711356" version="1" comment="kgraft-patch-3_12_53-60_30-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711358" version="1" comment="kernel-default is ==3.12.57-60.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711359" version="1" comment="kgraft-patch-3_12_57-60_35-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711361" version="1" comment="kernel-default is ==3.12.59-60.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711362" version="1" comment="kgraft-patch-3_12_59-60_41-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711364" version="1" comment="kernel-default is ==3.12.59-60.45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711365" version="1" comment="kgraft-patch-3_12_59-60_45-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129402" version="1" comment="kernel-default is &lt;3.12.59-60.45.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711368" version="1" comment="kernel-default is ==3.12.32-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711369" version="1" comment="kgraft-patch-3_12_32-33-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105317" version="1" comment="kernel-default is &lt;3.12.32-33.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711371" version="1" comment="kernel-default is ==3.12.36-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711372" version="1" comment="kgraft-patch-3_12_36-38-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105748" version="1" comment="kernel-default is &lt;3.12.36-38.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711374" version="1" comment="kgraft-patch-3_12_38-44-default is &gt;=2-7.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711376" version="1" comment="kgraft-patch-3_12_39-47-default is &gt;=2-10.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108369" version="1" comment="kernel-default is &lt;3.12.39-47.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711378" version="1" comment="kgraft-patch-3_12_32-33-default is &gt;=2-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711380" version="1" comment="kgraft-patch-3_12_36-38-default is &gt;=2-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711382" version="1" comment="kgraft-patch-3_12_43-52_6-default is &gt;=2-6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110507" version="1" comment="kernel-default is &lt;3.12.43-52.6.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705474" version="1" comment="libpython3_6m1_0 is &lt;3.6.15-150300.10.27.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177173" version="1" comment="libpython3_6m1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705475" version="1" comment="python3 is &lt;3.6.15-150300.10.27.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151916" version="1" comment="python3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705476" version="1" comment="python3-base is &lt;3.6.15-150300.10.27.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151647" version="1" comment="python3-base is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705465" version="1" comment="openSUSE-release is ==5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711384" version="1" comment="kgraft-patch-3_12_32-33-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711386" version="1" comment="kgraft-patch-3_12_36-38-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711388" version="1" comment="kgraft-patch-3_12_38-44-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711390" version="1" comment="kgraft-patch-3_12_39-47-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711392" version="1" comment="kgraft-patch-3_12_43-52_6-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711394" version="1" comment="kgraft-patch-3_12_44-52_10-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711396" version="1" comment="kgraft-patch-3_12_44-52_18-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711398" version="1" comment="kgraft-patch-3_12_48-52_27-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711400" version="1" comment="kgraft-patch-3_12_49-11-default is &gt;=2-5.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141891" version="1" comment="kernel-default is &lt;3.12.49-11.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711402" version="1" comment="kgraft-patch-3_12_32-33-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711404" version="1" comment="kgraft-patch-3_12_36-38-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711406" version="1" comment="kgraft-patch-3_12_38-44-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711408" version="1" comment="kgraft-patch-3_12_39-47-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711410" version="1" comment="kgraft-patch-3_12_43-52_6-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711412" version="1" comment="kgraft-patch-3_12_44-52_10-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711414" version="1" comment="kgraft-patch-3_12_44-52_18-default is &gt;=2-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114432" version="1" comment="kernel-default is &lt;3.12.44-52.18.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121536" version="1" comment="kernel-default is &lt;3.12.51-60.25.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711416" version="1" comment="kgraft-patch-3_12_51-52_31-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711418" version="1" comment="kgraft-patch-3_12_51-60_20-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118983" version="1" comment="kernel-default is &lt;3.12.51-60.20.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711420" version="1" comment="kgraft-patch-3_12_49-11-default is &gt;=3-8.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711422" version="1" comment="kgraft-patch-3_12_51-60_20-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711424" version="1" comment="kgraft-patch-3_12_51-60_25-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711426" version="1" comment="kgraft-patch-3_12_39-47-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711428" version="1" comment="kgraft-patch-3_12_43-52_6-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711430" version="1" comment="kgraft-patch-3_12_44-52_10-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711432" version="1" comment="kgraft-patch-3_12_44-52_18-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711434" version="1" comment="kgraft-patch-3_12_48-52_27-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711436" version="1" comment="kgraft-patch-3_12_49-11-default is &gt;=4-11.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711438" version="1" comment="kgraft-patch-3_12_51-52_31-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711440" version="1" comment="kgraft-patch-3_12_51-52_34-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711442" version="1" comment="kgraft-patch-3_12_51-52_39-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711444" version="1" comment="kgraft-patch-3_12_51-60_20-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711446" version="1" comment="kgraft-patch-3_12_51-60_25-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711448" version="1" comment="kgraft-patch-3_12_53-60_30-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123221" version="1" comment="kernel-default is &lt;3.12.53-60.30.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711450" version="1" comment="kgraft-patch-3_12_51-52_34-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711452" version="1" comment="kernel-default is ==4.4.21-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711453" version="1" comment="kgraft-patch-4_4_21-69-default is &gt;=3-8.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711454" version="1" comment="kernel-default is ==4.4.21-81.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711455" version="1" comment="kgraft-patch-4_4_21-81-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711456" version="1" comment="kernel-default is ==4.4.21-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711457" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711458" version="1" comment="kernel-default is ==4.4.21-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711459" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711460" version="1" comment="kernel-default is ==4.4.38-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711461" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147227" version="1" comment="kernel-default is &lt;4.4.38-93.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125799" version="1" comment="kernel-default is &lt;3.12.57-60.35.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711223" version="1" comment="kernel-default is &lt;5.3.18-150300.59.93.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151354" version="1" comment="kernel-default is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711224" version="1" comment="kernel-default-base is &lt;5.3.18-150300.59.93.1.150300.18.54.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151960" version="1" comment="kernel-default-base is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721582" version="1" comment="kernel-rt is &lt;5.3.18-150300.106.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009342860" version="1" comment="kernel-rt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718902" version="1" comment="libxml2-2 is &lt;2.9.7-150000.3.51.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151137" version="1" comment="libxml2-2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718905" version="1" comment="libxml2-tools is &lt;2.9.7-150000.3.51.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151140" version="1" comment="libxml2-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718907" version="1" comment="python3-libxml2-python is &lt;2.9.7-150000.3.51.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177126" version="1" comment="python3-libxml2-python is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711462" version="1" comment="kgraft-patch-3_12_49-11-default is &gt;=6-17.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711464" version="1" comment="kgraft-patch-3_12_51-60_20-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711466" version="1" comment="kgraft-patch-3_12_51-60_25-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711468" version="1" comment="kgraft-patch-3_12_53-60_30-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711470" version="1" comment="kgraft-patch-3_12_57-60_35-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711472" version="1" comment="kgraft-patch-3_12_59-60_41-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129344" version="1" comment="kernel-default is &lt;3.12.59-60.41.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711474" version="1" comment="kgraft-patch-3_12_49-11-default is &gt;=7-20.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711476" version="1" comment="kgraft-patch-3_12_51-60_20-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711478" version="1" comment="kgraft-patch-3_12_51-60_25-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711480" version="1" comment="kgraft-patch-3_12_53-60_30-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711482" version="1" comment="kgraft-patch-3_12_57-60_35-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711484" version="1" comment="kgraft-patch-3_12_59-60_41-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711486" version="1" comment="kgraft-patch-3_12_59-60_45-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711488" version="1" comment="kernel-default is ==3.12.62-60.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711489" version="1" comment="kgraft-patch-3_12_62-60_62-default is &gt;=3-5.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131004" version="1" comment="kernel-default is &lt;3.12.62-60.62.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711491" version="1" comment="kgraft-patch-3_12_59-60_45-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711493" version="1" comment="kgraft-patch-3_12_62-60_62-default is &gt;=2-9.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711495" version="1" comment="kernel-default is ==3.12.62-60.64.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711496" version="1" comment="kgraft-patch-3_12_62-60_64_8-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131270" version="1" comment="kernel-default is &lt;3.12.62-60.64.8.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711498" version="1" comment="kgraft-patch-3_12_49-11-default is &gt;=8-23.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711500" version="1" comment="kgraft-patch-3_12_51-60_20-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711502" version="1" comment="kgraft-patch-3_12_51-60_25-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711504" version="1" comment="kgraft-patch-3_12_53-60_30-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711506" version="1" comment="kgraft-patch-3_12_57-60_35-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711508" version="1" comment="kgraft-patch-3_12_51-60_25-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711510" version="1" comment="kgraft-patch-3_12_53-60_30-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711512" version="1" comment="kgraft-patch-3_12_57-60_35-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711514" version="1" comment="kgraft-patch-3_12_59-60_41-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711516" version="1" comment="kgraft-patch-3_12_59-60_45-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711518" version="1" comment="kgraft-patch-3_12_62-60_62-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711520" version="1" comment="kgraft-patch-3_12_62-60_64_8-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711522" version="1" comment="kernel-default is ==3.12.67-60.64.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711523" version="1" comment="kgraft-patch-3_12_67-60_64_18-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715596" version="1" comment="kernel-default is &lt;4.4.21-81.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711525" version="1" comment="kgraft-patch-3_12_59-60_41-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711527" version="1" comment="kgraft-patch-3_12_59-60_45-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711529" version="1" comment="kgraft-patch-3_12_62-60_62-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711531" version="1" comment="kgraft-patch-3_12_62-60_64_8-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711533" version="1" comment="kgraft-patch-3_12_67-60_64_18-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711535" version="1" comment="kgraft-patch-4_4_21-69-default is &gt;=2-5.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711536" version="1" comment="kgraft-patch-4_4_21-81-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711537" version="1" comment="kernel-default is ==3.12.67-60.64.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711538" version="1" comment="kgraft-patch-3_12_67-60_64_21-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136647" version="1" comment="kernel-default is &lt;4.4.21-84.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711540" version="1" comment="kernel-default is ==4.4.103-6.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711541" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711542" version="1" comment="kernel-default is ==4.4.103-6.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711543" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711544" version="1" comment="kernel-default is ==4.4.82-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711545" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711546" version="1" comment="kernel-default is ==4.4.82-6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711547" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711548" version="1" comment="kernel-default is ==4.4.82-6.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711549" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711550" version="1" comment="kernel-default is ==4.4.92-6.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711551" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711552" version="1" comment="kernel-default is ==4.4.92-6.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711553" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167761" version="1" comment="kernel-default is &lt;4.4.92-6.30.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711554" version="1" comment="kgraft-patch-4_4_21-69-default is &gt;=9-18.10.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711555" version="1" comment="kgraft-patch-4_4_21-81-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711556" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711557" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711558" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711559" version="1" comment="kernel-default is ==4.4.49-92.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711560" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711561" version="1" comment="kernel-default is ==4.4.49-92.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711562" version="1" comment="kgraft-patch-4_4_49-92_14-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711563" version="1" comment="kernel-default is ==4.4.59-92.17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711564" version="1" comment="kgraft-patch-4_4_59-92_17-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711565" version="1" comment="kernel-default is ==4.4.59-92.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711566" version="1" comment="kgraft-patch-4_4_59-92_20-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711567" version="1" comment="kernel-default is ==4.4.59-92.24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711568" version="1" comment="kgraft-patch-4_4_59-92_24-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711569" version="1" comment="kernel-default is ==4.4.74-92.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711570" version="1" comment="kgraft-patch-4_4_74-92_29-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711571" version="1" comment="kernel-default is ==4.4.74-92.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711572" version="1" comment="kgraft-patch-4_4_74-92_32-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711573" version="1" comment="kernel-default is ==4.4.74-92.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711574" version="1" comment="kgraft-patch-4_4_74-92_35-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711575" version="1" comment="kernel-default is ==4.4.74-92.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711576" version="1" comment="kgraft-patch-4_4_74-92_38-default is &gt;=2-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164286" version="1" comment="kernel-default is &lt;4.4.74-92.38.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711577" version="1" comment="kgraft-patch-4_4_21-69-default is &gt;=10-18.13.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711578" version="1" comment="kgraft-patch-4_4_21-81-default is &gt;=10-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711579" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=9-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711580" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=9-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711581" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=9-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711582" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=7-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711583" version="1" comment="kgraft-patch-4_4_49-92_14-default is &gt;=6-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711584" version="1" comment="kgraft-patch-4_4_59-92_17-default is &gt;=5-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711585" version="1" comment="kgraft-patch-4_4_59-92_20-default is &gt;=5-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711586" version="1" comment="kgraft-patch-4_4_59-92_24-default is &gt;=4-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711587" version="1" comment="kgraft-patch-4_4_74-92_29-default is &gt;=4-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711588" version="1" comment="kgraft-patch-4_4_74-92_32-default is &gt;=3-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711589" version="1" comment="kgraft-patch-4_4_74-92_35-default is &gt;=3-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161762" version="1" comment="kernel-default is &lt;4.4.74-92.35.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711590" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162427" version="1" comment="kernel-default is &lt;4.4.82-6.3.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711591" version="1" comment="kgraft-patch-4_4_21-69-default is &gt;=7-21.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711592" version="1" comment="kgraft-patch-4_4_21-81-default is &gt;=7-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711593" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=6-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711594" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=6-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711595" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=6-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711596" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=4-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711597" version="1" comment="kgraft-patch-4_4_49-92_14-default is &gt;=3-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711598" version="1" comment="kgraft-patch-4_4_59-92_17-default is &gt;=2-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711599" version="1" comment="kgraft-patch-4_4_59-92_20-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156965" version="1" comment="kernel-default is &lt;4.4.59-92.20.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711600" version="1" comment="kgraft-patch-4_4_59-92_17-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711601" version="1" comment="kgraft-patch-4_4_59-92_20-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711602" version="1" comment="kgraft-patch-4_4_59-92_24-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711603" version="1" comment="kgraft-patch-4_4_74-92_29-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711604" version="1" comment="kgraft-patch-4_4_74-92_32-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711605" version="1" comment="kgraft-patch-4_4_74-92_35-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711606" version="1" comment="kgraft-patch-4_4_74-92_38-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711607" version="1" comment="kernel-default is ==4.4.90-92.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711608" version="1" comment="kgraft-patch-4_4_90-92_45-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166113" version="1" comment="kernel-default is &lt;4.4.90-92.45.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711609" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711610" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711611" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711612" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166003" version="1" comment="kernel-default is &lt;4.4.92-6.18.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711613" version="1" comment="kernel-default is ==4.12.14-95.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711614" version="1" comment="kgraft-patch-4_12_14-95_40-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711615" version="1" comment="kernel-default is &lt;4.12.14-95.40.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711616" version="1" comment="kernel-default is ==4.12.14-120.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711617" version="1" comment="kgraft-patch-4_12_14-120-default is &gt;=8-21.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711618" version="1" comment="kernel-default is ==4.12.14-122.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711619" version="1" comment="kgraft-patch-4_12_14-122_7-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711620" version="1" comment="kernel-default is &lt;4.12.14-122.7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711621" version="1" comment="kernel-default is ==4.12.14-150.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711622" version="1" comment="kernel-livepatch-4_12_14-150_41-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711623" version="1" comment="kernel-default is &lt;4.12.14-150.41.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711624" version="1" comment="kernel-default is ==4.12.14-197.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711625" version="1" comment="kernel-livepatch-4_12_14-197_26-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711626" version="1" comment="kernel-default is &lt;4.12.14-197.26.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711627" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711628" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711629" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711630" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711631" version="1" comment="kgraft-patch-4_4_49-92_14-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157580" version="1" comment="kernel-default is &lt;4.4.59-92.24.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711632" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711633" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711634" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711635" version="1" comment="kernel-default is &lt;4.4.82-6.9.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711636" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711637" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711638" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711639" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711640" version="1" comment="kgraft-patch-4_4_49-92_14-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711641" version="1" comment="kgraft-patch-4_4_59-92_17-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711642" version="1" comment="kgraft-patch-4_4_59-92_20-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711643" version="1" comment="kgraft-patch-4_4_59-92_24-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711644" version="1" comment="kgraft-patch-4_4_74-92_29-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711645" version="1" comment="kgraft-patch-4_4_74-92_32-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711646" version="1" comment="kgraft-patch-4_4_74-92_35-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711647" version="1" comment="kgraft-patch-4_4_74-92_38-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711648" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711649" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711650" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711651" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711652" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711653" version="1" comment="kernel-default is ==4.4.114-94.11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711654" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711655" version="1" comment="kernel-default is ==4.4.114-94.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711656" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711657" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711658" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711659" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711660" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711661" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140695" version="1" comment="kernel-default is &lt;4.4.21-69.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711662" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711663" version="1" comment="kgraft-patch-4_4_49-92_14-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711664" version="1" comment="kgraft-patch-4_4_59-92_17-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711665" version="1" comment="kgraft-patch-4_4_59-92_20-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711666" version="1" comment="kgraft-patch-4_4_59-92_24-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711667" version="1" comment="kgraft-patch-4_4_74-92_29-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711668" version="1" comment="kgraft-patch-4_4_74-92_32-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711669" version="1" comment="kgraft-patch-4_4_74-92_35-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711670" version="1" comment="kgraft-patch-4_4_74-92_38-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711671" version="1" comment="kgraft-patch-4_4_90-92_45-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711672" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711673" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711674" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711675" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711676" version="1" comment="kernel-default is ==4.4.103-92.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711677" version="1" comment="kgraft-patch-4_4_103-92_53-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711678" version="1" comment="kernel-default is ==4.4.103-92.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711679" version="1" comment="kgraft-patch-4_4_103-92_56-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711680" version="1" comment="kernel-default is ==4.4.90-92.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711681" version="1" comment="kgraft-patch-4_4_90-92_50-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167754" version="1" comment="kernel-default is &lt;4.4.90-92.50.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711682" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711683" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711684" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711685" version="1" comment="kgraft-patch-4_4_103-92_53-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711686" version="1" comment="kgraft-patch-4_4_103-92_56-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711687" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711688" version="1" comment="kgraft-patch-4_4_49-92_14-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711689" version="1" comment="kgraft-patch-4_4_59-92_17-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711690" version="1" comment="kgraft-patch-4_4_59-92_20-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711691" version="1" comment="kgraft-patch-4_4_59-92_24-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711692" version="1" comment="kgraft-patch-4_4_74-92_29-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711693" version="1" comment="kgraft-patch-4_4_74-92_32-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711694" version="1" comment="kgraft-patch-4_4_74-92_35-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711695" version="1" comment="kgraft-patch-4_4_74-92_38-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711696" version="1" comment="kgraft-patch-4_4_90-92_45-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711697" version="1" comment="kgraft-patch-4_4_90-92_50-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711698" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711699" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711700" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711701" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711702" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711703" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711704" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711705" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711706" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711707" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711708" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711709" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711710" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714892" version="1" comment="kernel-default is ==4.12.14-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711711" version="1" comment="kernel-livepatch-4_12_14-23-default is &gt;=2-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711712" version="1" comment="kernel-default is ==4.12.14-25.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711713" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714893" version="1" comment="kernel-default is &lt;4.12.14-25.3.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711714" version="1" comment="kgraft-patch-4_4_21-69-default is &gt;=8-18.7.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711715" version="1" comment="kgraft-patch-4_4_21-81-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711716" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711717" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711718" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711719" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149009" version="1" comment="kernel-default is &lt;4.4.49-92.11.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009753636" version="1" comment="kernel-default is &lt;5.3.18-150300.59.118.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009753637" version="1" comment="kernel-default-base is &lt;5.3.18-150300.59.118.1.150300.18.68.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009753815" version="1" comment="kernel-rt is &lt;5.3.18-150300.124.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711720" version="1" comment="kgraft-patch-3_12_57-60_35-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711722" version="1" comment="kgraft-patch-3_12_59-60_41-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711724" version="1" comment="kgraft-patch-3_12_59-60_45-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711726" version="1" comment="kgraft-patch-3_12_62-60_62-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711728" version="1" comment="kgraft-patch-3_12_62-60_64_8-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711730" version="1" comment="kgraft-patch-3_12_67-60_64_18-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711732" version="1" comment="kgraft-patch-3_12_67-60_64_21-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711734" version="1" comment="kernel-default is ==3.12.67-60.64.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711735" version="1" comment="kgraft-patch-3_12_67-60_64_24-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711737" version="1" comment="kernel-default is ==3.12.69-60.64.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711738" version="1" comment="kgraft-patch-3_12_69-60_64_29-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711740" version="1" comment="kgraft-patch-4_4_21-69-default is &gt;=4-11.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711741" version="1" comment="kgraft-patch-4_4_21-81-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711742" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711743" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711744" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710425" version="1" comment="perl is &lt;5.26.1-150300.17.11.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151455" version="1" comment="perl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710426" version="1" comment="perl-base is &lt;5.26.1-150300.17.11.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151457" version="1" comment="perl-base is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711745" version="1" comment="kgraft-patch-3_12_57-60_35-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711747" version="1" comment="kgraft-patch-3_12_59-60_41-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711749" version="1" comment="kgraft-patch-3_12_59-60_45-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711751" version="1" comment="kgraft-patch-3_12_62-60_62-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711753" version="1" comment="kgraft-patch-3_12_62-60_64_8-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711755" version="1" comment="kgraft-patch-3_12_67-60_64_18-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711757" version="1" comment="kgraft-patch-3_12_67-60_64_21-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711759" version="1" comment="kgraft-patch-3_12_67-60_64_24-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711761" version="1" comment="kgraft-patch-3_12_69-60_64_29-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711763" version="1" comment="kernel-default is ==3.12.69-60.64.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711764" version="1" comment="kgraft-patch-3_12_69-60_64_32-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711766" version="1" comment="kgraft-patch-4_4_21-69-default is &gt;=5-14.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711767" version="1" comment="kgraft-patch-4_4_21-81-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711768" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711769" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711770" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711771" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711772" version="1" comment="kgraft-patch-3_12_59-60_41-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711774" version="1" comment="kgraft-patch-3_12_59-60_45-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711776" version="1" comment="kgraft-patch-3_12_62-60_62-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711778" version="1" comment="kgraft-patch-3_12_62-60_64_8-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711780" version="1" comment="kgraft-patch-3_12_67-60_64_18-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711782" version="1" comment="kgraft-patch-3_12_67-60_64_21-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711784" version="1" comment="kgraft-patch-3_12_67-60_64_24-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711786" version="1" comment="kgraft-patch-3_12_69-60_64_29-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711788" version="1" comment="kgraft-patch-3_12_69-60_64_32-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711790" version="1" comment="kernel-default is ==3.12.69-60.64.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711791" version="1" comment="kgraft-patch-3_12_69-60_64_35-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711793" version="1" comment="kgraft-patch-4_4_21-69-default is &gt;=6-17.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711794" version="1" comment="kgraft-patch-4_4_21-81-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711795" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711796" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711797" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711798" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711799" version="1" comment="kgraft-patch-4_4_49-92_14-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150055" version="1" comment="kernel-default is &lt;4.4.49-92.14.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711800" version="1" comment="kgraft-patch-4_4_49-92_14-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711801" version="1" comment="kgraft-patch-4_4_59-92_17-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711802" version="1" comment="kgraft-patch-4_4_59-92_20-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711803" version="1" comment="kgraft-patch-4_4_59-92_24-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711804" version="1" comment="kgraft-patch-4_4_74-92_29-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158776" version="1" comment="kernel-default is &lt;4.4.74-92.29.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711805" version="1" comment="kernel-default is ==4.4.73-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711806" version="1" comment="kgraft-patch-4_4_73-5-default is &gt;=2-2.3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159035" version="1" comment="kernel-default is &lt;4.4.73-5.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705489" version="1" comment="dwarves is &lt;1.22-150300.7.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703508" version="1" comment="dwarves is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705490" version="1" comment="elfutils is &lt;0.177-150300.11.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152057" version="1" comment="elfutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705491" version="1" comment="libasm1 is &lt;0.177-150300.11.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152058" version="1" comment="libasm1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705492" version="1" comment="libdw1 is &lt;0.177-150300.11.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152059" version="1" comment="libdw1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705493" version="1" comment="libdwarves-devel is &lt;1.22-150300.7.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703509" version="1" comment="libdwarves-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705494" version="1" comment="libdwarves1 is &lt;1.22-150300.7.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703511" version="1" comment="libdwarves1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705495" version="1" comment="libebl-plugins is &lt;0.177-150300.11.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177196" version="1" comment="libebl-plugins is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705496" version="1" comment="libelf1 is &lt;0.177-150300.11.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152060" version="1" comment="libelf1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711807" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711808" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711809" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711810" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711811" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711812" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711813" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711814" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711815" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711816" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711817" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711818" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711819" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711820" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711821" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711822" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711823" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711824" version="1" comment="kernel-default is ==4.4.120-94.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711825" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711826" version="1" comment="kernel-default is ==4.4.126-94.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711827" version="1" comment="kgraft-patch-4_4_126-94_22-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711828" version="1" comment="kernel-default is ==4.12.14-95.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711829" version="1" comment="kgraft-patch-4_12_14-95_19-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711830" version="1" comment="kernel-default is ==4.12.14-95.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711831" version="1" comment="kgraft-patch-4_12_14-95_24-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711832" version="1" comment="kernel-default is ==4.12.14-95.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711833" version="1" comment="kgraft-patch-4_12_14-95_29-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711834" version="1" comment="kernel-default is ==4.12.14-95.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711835" version="1" comment="kgraft-patch-4_12_14-95_32-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711836" version="1" comment="kernel-default is ==4.12.14-95.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711837" version="1" comment="kgraft-patch-4_12_14-95_37-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711838" version="1" comment="kgraft-patch-4_12_14-95_40-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711839" version="1" comment="kernel-default is ==4.12.14-95.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711840" version="1" comment="kgraft-patch-4_12_14-95_45-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711841" version="1" comment="kernel-default is ==4.12.14-95.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711842" version="1" comment="kgraft-patch-4_12_14-95_48-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711843" version="1" comment="kernel-default is ==4.12.14-95.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711844" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711845" version="1" comment="kernel-default is &lt;4.12.14-95.51.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711846" version="1" comment="kgraft-patch-4_12_14-120-default is &gt;=5-12.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711847" version="1" comment="kernel-default is ==4.12.14-122.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711848" version="1" comment="kgraft-patch-4_12_14-122_12-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711849" version="1" comment="kernel-default is ==4.12.14-122.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711850" version="1" comment="kgraft-patch-4_12_14-122_17-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711851" version="1" comment="kernel-default is ==4.12.14-122.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711852" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711853" version="1" comment="kgraft-patch-4_12_14-122_7-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711854" version="1" comment="kernel-default is ==4.12.14-150.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711855" version="1" comment="kernel-livepatch-4_12_14-150_22-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711856" version="1" comment="kernel-default is ==4.12.14-150.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711857" version="1" comment="kernel-livepatch-4_12_14-150_27-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711858" version="1" comment="kernel-default is ==4.12.14-150.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711859" version="1" comment="kernel-livepatch-4_12_14-150_32-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711860" version="1" comment="kernel-default is ==4.12.14-150.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711861" version="1" comment="kernel-livepatch-4_12_14-150_35-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711862" version="1" comment="kernel-default is ==4.12.14-150.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711863" version="1" comment="kernel-livepatch-4_12_14-150_38-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711864" version="1" comment="kernel-livepatch-4_12_14-150_41-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711865" version="1" comment="kernel-default is ==4.12.14-150.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711866" version="1" comment="kernel-livepatch-4_12_14-150_47-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711867" version="1" comment="kernel-default is &lt;4.12.14-150.47.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714895" version="1" comment="kernel-default is ==4.12.14-195.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711868" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=12-34.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711869" version="1" comment="kernel-default is ==4.12.14-197.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711870" version="1" comment="kernel-livepatch-4_12_14-197_10-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711871" version="1" comment="kernel-default is ==4.12.14-197.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711872" version="1" comment="kernel-livepatch-4_12_14-197_15-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711873" version="1" comment="kernel-default is ==4.12.14-197.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711874" version="1" comment="kernel-livepatch-4_12_14-197_18-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711875" version="1" comment="kernel-default is ==4.12.14-197.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711876" version="1" comment="kernel-livepatch-4_12_14-197_21-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711877" version="1" comment="kernel-livepatch-4_12_14-197_26-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711878" version="1" comment="kernel-default is ==4.12.14-197.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711879" version="1" comment="kernel-livepatch-4_12_14-197_29-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711880" version="1" comment="kernel-default is ==4.12.14-197.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711881" version="1" comment="kernel-livepatch-4_12_14-197_34-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711882" version="1" comment="kernel-default is ==4.12.14-197.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711883" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711884" version="1" comment="kernel-default is ==4.12.14-197.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711885" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711886" version="1" comment="kernel-default is ==4.12.14-197.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711887" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711888" version="1" comment="kernel-default is ==4.12.14-197.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711889" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712211" version="1" comment="kernel-default is &lt;4.12.14-197.7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711890" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711891" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711892" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711893" version="1" comment="kgraft-patch-4_4_126-94_22-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711894" version="1" comment="kernel-default is ==4.4.131-94.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711895" version="1" comment="kgraft-patch-4_4_131-94_29-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711896" version="1" comment="kernel-default is ==4.4.132-94.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711897" version="1" comment="kgraft-patch-4_4_132-94_33-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711898" version="1" comment="kernel-default is ==4.12.14-25.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711899" version="1" comment="kernel-livepatch-4_12_14-25_13-default is &gt;=3-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711900" version="1" comment="kernel-default is ==4.12.14-25.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711901" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712098" version="1" comment="kernel-default is &lt;4.12.14-25.6.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711902" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711903" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711904" version="1" comment="kgraft-patch-4_4_126-94_22-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711905" version="1" comment="kgraft-patch-4_4_131-94_29-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711906" version="1" comment="kgraft-patch-4_4_132-94_33-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711907" version="1" comment="kernel-default is ==4.4.138-94.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711908" version="1" comment="kgraft-patch-4_4_138-94_39-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711909" version="1" comment="kernel-default is ==4.4.140-94.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711910" version="1" comment="kgraft-patch-4_4_140-94_42-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711911" version="1" comment="kernel-default is ==4.4.143-94.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711912" version="1" comment="kgraft-patch-4_4_143-94_47-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711913" version="1" comment="kernel-livepatch-4_12_14-23-default is &gt;=4-10.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711914" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009719785" version="1" comment="python3-cryptography is &lt;2.9.2-150200.13.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238251" version="1" comment="python3-cryptography is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711915" version="1" comment="kernel-default is ==4.12.14-25.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711916" version="1" comment="kernel-livepatch-4_12_14-25_16-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711917" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711918" version="1" comment="kernel-livepatch-4_12_14-23-default is &gt;=9-25.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711919" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480339" version="1" comment="kernel-default is &lt;4.12.14-23.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711920" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711921" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711922" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711923" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711924" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711925" version="1" comment="kgraft-patch-4_4_126-94_22-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711926" version="1" comment="kgraft-patch-4_4_131-94_29-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711927" version="1" comment="kgraft-patch-4_4_132-94_33-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711928" version="1" comment="kgraft-patch-4_4_138-94_39-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711929" version="1" comment="kgraft-patch-4_4_140-94_42-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711930" version="1" comment="kgraft-patch-4_4_143-94_47-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711931" version="1" comment="kernel-default is ==4.4.155-94.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711932" version="1" comment="kgraft-patch-4_4_155-94_50-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711933" version="1" comment="kernel-default is ==4.4.156-94.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711934" version="1" comment="kgraft-patch-4_4_156-94_57-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711935" version="1" comment="kernel-default is ==4.4.156-94.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711936" version="1" comment="kgraft-patch-4_4_156-94_61-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711937" version="1" comment="kernel-default is ==4.4.156-94.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711938" version="1" comment="kgraft-patch-4_4_156-94_64-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711939" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711940" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711941" version="1" comment="kernel-livepatch-4_12_14-23-default is &gt;=5-13.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711942" version="1" comment="kernel-livepatch-4_12_14-25_13-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711943" version="1" comment="kernel-livepatch-4_12_14-25_16-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711944" version="1" comment="kernel-default is ==4.12.14-25.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711945" version="1" comment="kernel-livepatch-4_12_14-25_19-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711946" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711947" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711948" version="1" comment="kgraft-patch-4_4_132-94_33-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711949" version="1" comment="kgraft-patch-4_4_138-94_39-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711950" version="1" comment="kgraft-patch-4_4_140-94_42-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711951" version="1" comment="kernel-default is &lt;4.4.140-94.42.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711952" version="1" comment="kernel-livepatch-4_12_14-23-default is &gt;=10-28.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711953" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711954" version="1" comment="kernel-livepatch-4_12_14-23-default is &gt;=3-7.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711955" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711956" version="1" comment="kernel-default is ==4.12.14-94.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711957" version="1" comment="kgraft-patch-4_12_14-94_41-default is &gt;=9-2.25.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711958" version="1" comment="kernel-default is ==4.12.14-95.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711959" version="1" comment="kgraft-patch-4_12_14-95_3-default is &gt;=8-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711960" version="1" comment="kernel-default is ==4.12.14-95.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711961" version="1" comment="kgraft-patch-4_12_14-95_6-default is &gt;=7-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711962" version="1" comment="kernel-default is &lt;4.12.14-95.6.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711963" version="1" comment="kernel-default is ==4.12.14-25.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711964" version="1" comment="kernel-livepatch-4_12_14-25_28-default is &gt;=7-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711965" version="1" comment="kernel-default is &lt;4.12.14-25.28.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711966" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711967" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711968" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711969" version="1" comment="kgraft-patch-4_4_126-94_22-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711970" version="1" comment="kgraft-patch-4_4_131-94_29-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711971" version="1" comment="kgraft-patch-4_4_132-94_33-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711972" version="1" comment="kgraft-patch-4_4_138-94_39-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711973" version="1" comment="kgraft-patch-4_4_140-94_42-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711974" version="1" comment="kgraft-patch-4_4_143-94_47-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711975" version="1" comment="kgraft-patch-4_4_155-94_50-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711976" version="1" comment="kgraft-patch-4_4_156-94_57-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711977" version="1" comment="kgraft-patch-4_4_156-94_61-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711978" version="1" comment="kgraft-patch-4_4_156-94_64-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711979" version="1" comment="kernel-default is ==4.4.162-94.69.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711980" version="1" comment="kgraft-patch-4_4_162-94_69-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711981" version="1" comment="kernel-default is ==4.4.162-94.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711982" version="1" comment="kgraft-patch-4_4_162-94_72-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711983" version="1" comment="kernel-default is &lt;4.4.162-94.72.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711984" version="1" comment="kgraft-patch-4_12_14-94_41-default is &gt;=3-2.7.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711985" version="1" comment="kgraft-patch-4_12_14-95_3-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711986" version="1" comment="kernel-default is &lt;4.12.14-95.3.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711987" version="1" comment="kernel-livepatch-4_12_14-23-default is &gt;=8-22.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711988" version="1" comment="kernel-livepatch-4_12_14-25_13-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711989" version="1" comment="kernel-livepatch-4_12_14-25_16-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711990" version="1" comment="kernel-livepatch-4_12_14-25_19-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711991" version="1" comment="kernel-default is ==4.12.14-25.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711992" version="1" comment="kernel-livepatch-4_12_14-25_22-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711993" version="1" comment="kernel-default is ==4.12.14-25.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711994" version="1" comment="kernel-livepatch-4_12_14-25_25-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711995" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711996" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711997" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711998" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711999" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712000" version="1" comment="kernel-livepatch-4_12_14-23-default is &gt;=6-16.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712001" version="1" comment="kernel-default is ==4.12.14-95.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712002" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712003" version="1" comment="kernel-default is ==4.12.14-95.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712004" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698690" version="1" comment="kernel-default is ==4.12.14-95.74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712005" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698692" version="1" comment="kernel-default is ==4.12.14-95.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712006" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698694" version="1" comment="kernel-default is ==4.12.14-95.80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712007" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698696" version="1" comment="kernel-default is ==4.12.14-95.83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712008" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698698" version="1" comment="kernel-default is &lt;4.12.14-95.83.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712009" version="1" comment="kernel-default is ==4.12.14-150.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712010" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712011" version="1" comment="kernel-default is ==4.12.14-150.69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712012" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698720" version="1" comment="kernel-default is ==4.12.14-150.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712013" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698722" version="1" comment="kernel-default is ==4.12.14-150.75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712014" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698724" version="1" comment="kernel-default is ==4.12.14-150.78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712015" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698726" version="1" comment="kernel-default is &lt;4.12.14-150.78.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712016" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712017" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=7-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712018" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=7-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712019" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=5-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712020" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=5-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712021" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=4-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712022" version="1" comment="kgraft-patch-4_4_126-94_22-default is &gt;=4-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712023" version="1" comment="kgraft-patch-4_4_131-94_29-default is &gt;=2-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712024" version="1" comment="kgraft-patch-4_4_132-94_33-default is &gt;=2-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712025" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=10-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712026" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=9-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712027" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=9-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712028" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=8-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712029" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=7-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712030" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712031" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712032" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712033" version="1" comment="kgraft-patch-4_4_126-94_22-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712034" version="1" comment="kgraft-patch-4_4_131-94_29-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712035" version="1" comment="kgraft-patch-4_4_132-94_33-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712036" version="1" comment="kgraft-patch-4_4_138-94_39-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712037" version="1" comment="kgraft-patch-4_4_140-94_42-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712038" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712039" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712040" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712041" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712042" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712043" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712044" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712045" version="1" comment="kgraft-patch-4_4_126-94_22-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712046" version="1" comment="kgraft-patch-4_4_131-94_29-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712047" version="1" comment="kgraft-patch-4_4_132-94_33-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712048" version="1" comment="kernel-default is &lt;4.4.132-94.33.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712049" version="1" comment="kernel-livepatch-4_12_14-23-default is &gt;=7-19.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712050" version="1" comment="kgraft-patch-4_12_14-95_32-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712051" version="1" comment="kgraft-patch-4_12_14-95_37-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712052" version="1" comment="kgraft-patch-4_12_14-95_40-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712053" version="1" comment="kgraft-patch-4_12_14-120-default is &gt;=6-15.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512974" version="1" comment="kernel-default is &lt;4.12.14-120.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712054" version="1" comment="kernel-livepatch-4_12_14-150_35-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712055" version="1" comment="kernel-livepatch-4_12_14-150_38-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712056" version="1" comment="kernel-livepatch-4_12_14-150_41-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712057" version="1" comment="kernel-livepatch-4_12_14-197_18-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712058" version="1" comment="kernel-livepatch-4_12_14-197_21-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712059" version="1" comment="kernel-livepatch-4_12_14-197_26-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712060" version="1" comment="kernel-default is ==4.12.14-95.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712061" version="1" comment="kgraft-patch-4_12_14-95_13-default is &gt;=6-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712062" version="1" comment="kernel-default is ==4.12.14-95.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712063" version="1" comment="kgraft-patch-4_12_14-95_16-default is &gt;=6-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712064" version="1" comment="kgraft-patch-4_12_14-95_19-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712065" version="1" comment="kgraft-patch-4_12_14-95_24-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712066" version="1" comment="kgraft-patch-4_12_14-95_29-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712067" version="1" comment="kgraft-patch-4_12_14-95_32-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712068" version="1" comment="kgraft-patch-4_12_14-95_37-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712069" version="1" comment="kgraft-patch-4_12_14-120-default is &gt;=2-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712070" version="1" comment="kernel-default is ==4.12.14-150.14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712071" version="1" comment="kernel-livepatch-4_12_14-150_14-default is &gt;=6-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712072" version="1" comment="kernel-default is ==4.12.14-150.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712073" version="1" comment="kernel-livepatch-4_12_14-150_17-default is &gt;=6-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712074" version="1" comment="kernel-livepatch-4_12_14-150_22-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712075" version="1" comment="kernel-livepatch-4_12_14-150_27-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712076" version="1" comment="kernel-livepatch-4_12_14-150_32-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712077" version="1" comment="kernel-livepatch-4_12_14-150_35-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712078" version="1" comment="kernel-livepatch-4_12_14-150_38-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712079" version="1" comment="kernel-livepatch-4_12_14-25_25-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712080" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=8-22.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712081" version="1" comment="kernel-livepatch-4_12_14-197_10-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712082" version="1" comment="kernel-livepatch-4_12_14-197_15-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712083" version="1" comment="kernel-livepatch-4_12_14-197_18-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712084" version="1" comment="kernel-livepatch-4_12_14-197_21-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712085" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712086" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712087" version="1" comment="kgraft-patch-4_12_14-94_41-default is &gt;=5-2.13.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712088" version="1" comment="kgraft-patch-4_12_14-95_3-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712089" version="1" comment="kgraft-patch-4_12_14-95_6-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712090" version="1" comment="kernel-livepatch-4_12_14-25_13-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712091" version="1" comment="kernel-livepatch-4_12_14-25_16-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712092" version="1" comment="kernel-livepatch-4_12_14-25_19-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712093" version="1" comment="kernel-livepatch-4_12_14-25_22-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712094" version="1" comment="kernel-livepatch-4_12_14-25_25-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712095" version="1" comment="kernel-livepatch-4_12_14-25_28-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712096" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712097" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730086" version="1" comment="qemu-ovmf-x86_64 is &lt;202008-150300.10.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231460" version="1" comment="qemu-ovmf-x86_64 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730087" version="1" comment="qemu-uefi-aarch64 is &lt;202008-150300.10.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623392" version="1" comment="qemu-uefi-aarch64 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712099" version="1" comment="kgraft-patch-4_4_138-94_39-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712100" version="1" comment="kgraft-patch-4_4_140-94_42-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712101" version="1" comment="kgraft-patch-4_4_143-94_47-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712102" version="1" comment="kgraft-patch-4_4_155-94_50-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712103" version="1" comment="kgraft-patch-4_4_156-94_57-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712104" version="1" comment="kgraft-patch-4_4_156-94_61-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712105" version="1" comment="kgraft-patch-4_4_156-94_64-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712106" version="1" comment="kgraft-patch-4_4_162-94_69-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712107" version="1" comment="kgraft-patch-4_4_162-94_72-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712108" version="1" comment="kernel-default is ==4.4.175-94.79.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712109" version="1" comment="kgraft-patch-4_4_175-94_79-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712110" version="1" comment="kernel-default is ==4.4.176-94.88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712111" version="1" comment="kgraft-patch-4_4_176-94_88-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712112" version="1" comment="kernel-default is ==4.4.178-94.91.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712113" version="1" comment="kgraft-patch-4_4_178-94_91-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712114" version="1" comment="kernel-default is &lt;4.4.178-94.91.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712115" version="1" comment="kgraft-patch-4_12_14-94_41-default is &gt;=6-2.16.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712116" version="1" comment="kgraft-patch-4_12_14-95_13-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712117" version="1" comment="kgraft-patch-4_12_14-95_16-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712118" version="1" comment="kgraft-patch-4_12_14-95_3-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712119" version="1" comment="kgraft-patch-4_12_14-95_6-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712120" version="1" comment="kernel-livepatch-4_12_14-150_14-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712121" version="1" comment="kernel-livepatch-4_12_14-150_17-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712122" version="1" comment="kernel-livepatch-4_12_14-25_13-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712123" version="1" comment="kernel-livepatch-4_12_14-25_16-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712124" version="1" comment="kernel-livepatch-4_12_14-25_19-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712125" version="1" comment="kernel-livepatch-4_12_14-25_22-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712126" version="1" comment="kernel-livepatch-4_12_14-25_25-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712127" version="1" comment="kernel-livepatch-4_12_14-25_28-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712128" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712129" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712130" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=4-10.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481199" version="1" comment="kernel-default is &lt;4.12.14-195.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712131" version="1" comment="kgraft-patch-4_12_14-95_19-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712132" version="1" comment="kernel-livepatch-4_12_14-150_22-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712133" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712134" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712135" version="1" comment="kernel-default is ==4.4.180-94.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712136" version="1" comment="kgraft-patch-4_4_180-94_97-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712137" version="1" comment="kernel-default is &lt;4.4.180-94.97.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712138" version="1" comment="kgraft-patch-4_12_14-95_13-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712139" version="1" comment="kgraft-patch-4_12_14-95_16-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712140" version="1" comment="kernel-livepatch-4_12_14-150_14-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712141" version="1" comment="kernel-livepatch-4_12_14-150_17-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712142" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=2-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712143" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=3-7.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712144" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714896" version="1" comment="kernel-default is &lt;4.12.14-197.4.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708039" version="1" comment="libonig4 is &lt;6.7.0-150000.3.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714765" version="1" comment="libonig4 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712145" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=5-13.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712146" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712147" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009754737" version="1" comment="qemu-ovmf-x86_64 is &lt;202008-150300.10.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009754738" version="1" comment="qemu-uefi-aarch64 is &lt;202008-150300.10.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712148" version="1" comment="kgraft-patch-4_12_14-94_41-default is &gt;=7-2.19.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712149" version="1" comment="kgraft-patch-4_12_14-95_13-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712150" version="1" comment="kgraft-patch-4_12_14-95_16-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712151" version="1" comment="kgraft-patch-4_12_14-95_19-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712152" version="1" comment="kgraft-patch-4_12_14-95_24-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712153" version="1" comment="kgraft-patch-4_12_14-95_29-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712154" version="1" comment="kgraft-patch-4_12_14-95_3-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712155" version="1" comment="kgraft-patch-4_12_14-95_6-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712156" version="1" comment="kernel-livepatch-4_12_14-150_14-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712157" version="1" comment="kernel-livepatch-4_12_14-150_17-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712158" version="1" comment="kernel-livepatch-4_12_14-150_22-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712159" version="1" comment="kernel-livepatch-4_12_14-150_27-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712160" version="1" comment="kernel-livepatch-4_12_14-150_32-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712161" version="1" comment="kernel-livepatch-4_12_14-25_19-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712162" version="1" comment="kernel-livepatch-4_12_14-25_22-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712163" version="1" comment="kernel-livepatch-4_12_14-25_25-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712164" version="1" comment="kernel-livepatch-4_12_14-25_28-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712165" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=6-16.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712166" version="1" comment="kernel-livepatch-4_12_14-197_10-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712167" version="1" comment="kernel-livepatch-4_12_14-197_15-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712168" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712169" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712170" version="1" comment="kgraft-patch-4_12_14-95_45-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712171" version="1" comment="kernel-default is &lt;4.12.14-95.45.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712172" version="1" comment="kgraft-patch-4_12_14-122_12-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712173" version="1" comment="kgraft-patch-4_12_14-122_7-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712174" version="1" comment="kernel-livepatch-4_12_14-150_47-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712175" version="1" comment="kernel-livepatch-4_12_14-197_29-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712176" version="1" comment="kernel-default is &lt;4.12.14-197.29.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712177" version="1" comment="kgraft-patch-4_12_14-95_13-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712178" version="1" comment="kgraft-patch-4_12_14-95_16-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712179" version="1" comment="kgraft-patch-4_12_14-95_19-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712180" version="1" comment="kgraft-patch-4_12_14-95_24-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712181" version="1" comment="kgraft-patch-4_12_14-95_29-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712182" version="1" comment="kgraft-patch-4_12_14-95_32-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712183" version="1" comment="kgraft-patch-4_12_14-95_37-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712184" version="1" comment="kgraft-patch-4_12_14-95_40-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712185" version="1" comment="kgraft-patch-4_12_14-95_45-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712186" version="1" comment="kgraft-patch-4_12_14-95_6-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712187" version="1" comment="kgraft-patch-4_12_14-122_12-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712188" version="1" comment="kgraft-patch-4_12_14-122_7-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712189" version="1" comment="kernel-livepatch-4_12_14-150_14-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712190" version="1" comment="kernel-livepatch-4_12_14-150_17-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712191" version="1" comment="kernel-livepatch-4_12_14-150_22-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712192" version="1" comment="kernel-livepatch-4_12_14-150_27-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712193" version="1" comment="kernel-livepatch-4_12_14-150_32-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712194" version="1" comment="kernel-livepatch-4_12_14-150_35-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712195" version="1" comment="kernel-livepatch-4_12_14-150_38-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712196" version="1" comment="kernel-livepatch-4_12_14-150_41-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712197" version="1" comment="kernel-livepatch-4_12_14-150_47-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712198" version="1" comment="kernel-livepatch-4_12_14-25_28-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712199" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=9-25.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712200" version="1" comment="kernel-livepatch-4_12_14-197_10-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712201" version="1" comment="kernel-livepatch-4_12_14-197_15-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712202" version="1" comment="kernel-livepatch-4_12_14-197_18-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712203" version="1" comment="kernel-livepatch-4_12_14-197_21-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712204" version="1" comment="kernel-livepatch-4_12_14-197_26-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712205" version="1" comment="kernel-livepatch-4_12_14-197_29-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712206" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712207" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712208" version="1" comment="kernel-default is &lt;4.12.14-197.18.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712209" version="1" comment="kernel-default is &lt;4.12.14-95.29.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712210" version="1" comment="kernel-default is &lt;4.12.14-150.32.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712212" version="1" comment="kgraft-patch-4_12_14-95_48-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712213" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712214" version="1" comment="kernel-default is ==4.12.14-95.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712215" version="1" comment="kgraft-patch-4_12_14-95_54-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712216" version="1" comment="kernel-default is &lt;4.12.14-95.54.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712217" version="1" comment="kernel-default is ==4.12.14-150.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712218" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712219" version="1" comment="kernel-default is &lt;4.12.14-150.52.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712220" version="1" comment="kgraft-patch-4_12_14-94_41-default is &gt;=8-2.22.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712221" version="1" comment="kgraft-patch-4_12_14-95_13-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712222" version="1" comment="kgraft-patch-4_12_14-95_16-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712223" version="1" comment="kgraft-patch-4_12_14-95_19-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712224" version="1" comment="kgraft-patch-4_12_14-95_24-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712225" version="1" comment="kgraft-patch-4_12_14-95_29-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712226" version="1" comment="kgraft-patch-4_12_14-95_3-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712227" version="1" comment="kgraft-patch-4_12_14-95_32-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712228" version="1" comment="kgraft-patch-4_12_14-95_6-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712229" version="1" comment="kernel-livepatch-4_12_14-150_14-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712230" version="1" comment="kernel-livepatch-4_12_14-150_17-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712231" version="1" comment="kernel-livepatch-4_12_14-150_22-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712232" version="1" comment="kernel-livepatch-4_12_14-150_27-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712233" version="1" comment="kernel-livepatch-4_12_14-150_32-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712234" version="1" comment="kernel-livepatch-4_12_14-150_35-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712235" version="1" comment="kernel-livepatch-4_12_14-150_38-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712236" version="1" comment="kernel-livepatch-4_12_14-25_28-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712237" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=7-19.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712238" version="1" comment="kernel-livepatch-4_12_14-197_10-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712239" version="1" comment="kernel-livepatch-4_12_14-197_18-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712240" version="1" comment="kernel-livepatch-4_12_14-197_21-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712241" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712242" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726610" version="1" comment="libpython3_6m1_0 is &lt;3.6.15-150300.10.37.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726611" version="1" comment="python3 is &lt;3.6.15-150300.10.37.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726612" version="1" comment="python3-base is &lt;3.6.15-150300.10.37.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009735606" version="1" comment="kernel-default is &lt;5.3.18-150300.59.109.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009735607" version="1" comment="kernel-default-base is &lt;5.3.18-150300.59.109.1.150300.18.62.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009734769" version="1" comment="kernel-rt is &lt;5.3.18-150300.115.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684736" version="1" comment="kernel-rt is &lt;5.3.18-150300.93.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701289" version="1" comment="libpcre2-8-0 is &lt;10.31-150000.3.12.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153653" version="1" comment="libpcre2-8-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725639" version="1" comment="db48-utils is &lt;4.8.30-150000.7.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726773" version="1" comment="db48-utils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725640" version="1" comment="libdb-4_8 is &lt;4.8.30-150000.7.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726774" version="1" comment="libdb-4_8 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712243" version="1" comment="kgraft-patch-4_12_14-95_16-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712244" version="1" comment="kgraft-patch-4_12_14-95_19-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712245" version="1" comment="kgraft-patch-4_12_14-95_24-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712246" version="1" comment="kgraft-patch-4_12_14-95_29-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712247" version="1" comment="kgraft-patch-4_12_14-95_32-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712248" version="1" comment="kgraft-patch-4_12_14-95_37-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712249" version="1" comment="kgraft-patch-4_12_14-95_40-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712250" version="1" comment="kgraft-patch-4_12_14-95_45-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712251" version="1" comment="kgraft-patch-4_12_14-120-default is &gt;=3-6.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712252" version="1" comment="kgraft-patch-4_12_14-122_12-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712253" version="1" comment="kgraft-patch-4_12_14-122_7-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712254" version="1" comment="kernel-livepatch-4_12_14-150_14-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712255" version="1" comment="kernel-livepatch-4_12_14-150_17-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712256" version="1" comment="kernel-livepatch-4_12_14-150_22-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712257" version="1" comment="kernel-livepatch-4_12_14-150_27-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712258" version="1" comment="kernel-livepatch-4_12_14-150_32-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712259" version="1" comment="kernel-livepatch-4_12_14-150_35-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712260" version="1" comment="kernel-livepatch-4_12_14-150_38-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712261" version="1" comment="kernel-livepatch-4_12_14-150_41-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712262" version="1" comment="kernel-livepatch-4_12_14-150_47-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712263" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=10-28.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712264" version="1" comment="kernel-livepatch-4_12_14-197_10-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712265" version="1" comment="kernel-livepatch-4_12_14-197_15-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712266" version="1" comment="kernel-livepatch-4_12_14-197_18-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712267" version="1" comment="kernel-livepatch-4_12_14-197_21-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712268" version="1" comment="kernel-livepatch-4_12_14-197_26-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712269" version="1" comment="kernel-livepatch-4_12_14-197_29-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712270" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712271" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714771" version="1" comment="opensc is &lt;0.19.0-150100.3.19.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239073" version="1" comment="opensc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712272" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712273" version="1" comment="kgraft-patch-4_4_126-94_22-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712274" version="1" comment="kgraft-patch-4_4_131-94_29-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712275" version="1" comment="kgraft-patch-4_4_132-94_33-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712276" version="1" comment="kgraft-patch-4_4_138-94_39-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712277" version="1" comment="kgraft-patch-4_4_140-94_42-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712278" version="1" comment="kgraft-patch-4_4_143-94_47-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712279" version="1" comment="kgraft-patch-4_4_155-94_50-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712280" version="1" comment="kgraft-patch-4_4_156-94_57-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712281" version="1" comment="kgraft-patch-4_4_156-94_61-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712282" version="1" comment="kgraft-patch-4_4_156-94_64-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712283" version="1" comment="kgraft-patch-4_4_162-94_69-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712284" version="1" comment="kgraft-patch-4_4_162-94_72-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712285" version="1" comment="kgraft-patch-4_12_14-94_41-default is &gt;=4-2.10.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712286" version="1" comment="kgraft-patch-4_12_14-95_3-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712287" version="1" comment="kgraft-patch-4_12_14-95_6-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712288" version="1" comment="kernel-livepatch-4_12_14-25_13-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712289" version="1" comment="kernel-livepatch-4_12_14-25_16-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712290" version="1" comment="kernel-livepatch-4_12_14-25_19-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712291" version="1" comment="kernel-livepatch-4_12_14-25_22-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712292" version="1" comment="kernel-livepatch-4_12_14-25_25-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712293" version="1" comment="kernel-livepatch-4_12_14-25_28-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712294" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712295" version="1" comment="kgraft-patch-4_4_175-94_79-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712296" version="1" comment="kernel-default is &lt;4.4.175-94.79.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712297" version="1" comment="kernel-default is &lt;4.12.14-95.48.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712298" version="1" comment="kgraft-patch-4_12_14-122_17-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712299" version="1" comment="kernel-livepatch-4_12_14-197_34-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712300" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712301" version="1" comment="kernel-default is &lt;4.12.14-197.37.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712302" version="1" comment="kgraft-patch-4_12_14-95_45-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712303" version="1" comment="kgraft-patch-4_12_14-95_48-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712304" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712305" version="1" comment="kgraft-patch-4_12_14-95_54-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712306" version="1" comment="kernel-default is ==4.12.14-95.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712307" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712308" version="1" comment="kernel-default is ==4.12.14-95.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712309" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712310" version="1" comment="kernel-default is &lt;4.12.14-95.60.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712311" version="1" comment="kernel-livepatch-4_12_14-150_47-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712312" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712313" version="1" comment="kernel-default is ==4.12.14-150.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712314" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712315" version="1" comment="kernel-default is ==4.12.14-150.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712316" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712317" version="1" comment="kernel-default is &lt;4.12.14-150.58.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712318" version="1" comment="kgraft-patch-4_12_14-95_37-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712319" version="1" comment="kgraft-patch-4_12_14-95_40-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712320" version="1" comment="kgraft-patch-4_12_14-95_45-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712321" version="1" comment="kgraft-patch-4_12_14-95_48-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712322" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712323" version="1" comment="kgraft-patch-4_12_14-120-default is &gt;=7-18.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712324" version="1" comment="kgraft-patch-4_12_14-122_12-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712325" version="1" comment="kgraft-patch-4_12_14-122_17-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712326" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712327" version="1" comment="kgraft-patch-4_12_14-122_7-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712328" version="1" comment="kernel-livepatch-4_12_14-150_41-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712329" version="1" comment="kernel-livepatch-4_12_14-150_47-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712330" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712331" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712332" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712333" version="1" comment="kernel-livepatch-4_12_14-197_26-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712334" version="1" comment="kernel-livepatch-4_12_14-197_29-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712335" version="1" comment="kernel-livepatch-4_12_14-197_34-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712336" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712337" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712338" version="1" comment="kernel-default is &lt;4.12.14-197.40.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712339" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712340" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712341" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712342" version="1" comment="kernel-default is ==4.12.14-150.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712343" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712344" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712345" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712346" version="1" comment="kernel-default is &lt;4.12.14-150.69.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712347" version="1" comment="kgraft-patch-4_12_14-95_48-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712348" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712349" version="1" comment="kgraft-patch-4_12_14-95_54-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712350" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712351" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712352" version="1" comment="kernel-default is ==4.12.14-95.65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712353" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712354" version="1" comment="kernel-default is &lt;4.12.14-95.65.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712355" version="1" comment="kgraft-patch-4_12_14-122_17-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712356" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712357" version="1" comment="kernel-default is ==4.12.14-122.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712358" version="1" comment="kgraft-patch-4_12_14-122_23-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712359" version="1" comment="kernel-default is ==4.12.14-122.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712360" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712361" version="1" comment="kernel-default is ==4.12.14-122.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712362" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712363" version="1" comment="kernel-default is ==4.12.14-122.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712364" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712365" version="1" comment="kernel-default is ==4.12.14-122.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712366" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712367" version="1" comment="kernel-default is ==4.12.14-122.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712368" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712369" version="1" comment="kernel-default is ==4.12.14-122.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712370" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712371" version="1" comment="kernel-default is ==4.12.14-122.51.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712372" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712373" version="1" comment="kernel-default is ==4.12.14-122.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712374" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712375" version="1" comment="kernel-default is &lt;4.12.14-122.54.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712376" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712377" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712378" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712379" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712380" version="1" comment="kernel-default is &lt;4.12.14-150.63.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712381" version="1" comment="kernel-livepatch-4_12_14-197_34-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712382" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712383" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712384" version="1" comment="kernel-default is ==4.12.14-197.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712385" version="1" comment="kernel-livepatch-4_12_14-197_45-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712386" version="1" comment="kernel-default is ==4.12.14-197.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712387" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712388" version="1" comment="kernel-default is ==4.12.14-197.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712389" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712390" version="1" comment="kernel-default is ==4.12.14-197.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712391" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712392" version="1" comment="kernel-default is ==4.12.14-197.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712393" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712394" version="1" comment="kernel-default is ==4.12.14-197.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712395" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712396" version="1" comment="kernel-default is ==4.12.14-197.67.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712397" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712398" version="1" comment="kernel-default is ==4.12.14-197.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712399" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712400" version="1" comment="kernel-default is ==4.12.14-197.75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712401" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712402" version="1" comment="kernel-default is &lt;4.12.14-197.75.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714897" version="1" comment="kernel-default is ==5.3.18-22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712403" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=7-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712404" version="1" comment="kernel-default is ==5.3.18-24.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712405" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712406" version="1" comment="kernel-default is ==5.3.18-24.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712407" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712408" version="1" comment="kernel-default is ==5.3.18-24.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712409" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714898" version="1" comment="kernel-default is &lt;5.3.18-24.9.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712410" version="1" comment="kernel-default is ==5.3.18-24.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712411" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712412" version="1" comment="kernel-default is ==5.3.18-24.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712413" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712414" version="1" comment="kernel-default is ==5.3.18-24.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712415" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712416" version="1" comment="kernel-default is ==5.3.18-24.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712417" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712418" version="1" comment="kernel-default is ==5.3.18-24.43.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712419" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781385" version="1" comment="libicu73_2 is &lt;73.2-150000.1.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782296" version="1" comment="libicu73_2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781386" version="1" comment="libicu73_2-bedata is &lt;73.2-150000.1.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782297" version="1" comment="libicu73_2-bedata is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781389" version="1" comment="libicu73_2-ledata is &lt;73.2-150000.1.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782300" version="1" comment="libicu73_2-ledata is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712420" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712421" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712422" version="1" comment="kgraft-patch-4_12_14-122_12-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712423" version="1" comment="kgraft-patch-4_12_14-122_17-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712424" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712425" version="1" comment="kgraft-patch-4_12_14-122_23-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712426" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712427" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712428" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712429" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712430" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712431" version="1" comment="kernel-livepatch-4_12_14-197_29-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712432" version="1" comment="kernel-livepatch-4_12_14-197_34-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712433" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712434" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712435" version="1" comment="kernel-livepatch-4_12_14-197_45-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712436" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712437" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712438" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712439" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712440" version="1" comment="kernel-default is &lt;4.12.14-197.61.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712441" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=4-11.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712442" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712443" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712444" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712445" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712446" version="1" comment="kgraft-patch-4_12_14-95_16-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712447" version="1" comment="kgraft-patch-4_12_14-95_19-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712448" version="1" comment="kgraft-patch-4_12_14-95_24-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712449" version="1" comment="kgraft-patch-4_12_14-95_29-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712450" version="1" comment="kgraft-patch-4_12_14-95_32-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712451" version="1" comment="kgraft-patch-4_12_14-95_37-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712452" version="1" comment="kgraft-patch-4_12_14-95_40-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712453" version="1" comment="kgraft-patch-4_12_14-95_45-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712454" version="1" comment="kgraft-patch-4_12_14-95_48-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712455" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712456" version="1" comment="kgraft-patch-4_12_14-120-default is &gt;=4-9.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712457" version="1" comment="kgraft-patch-4_12_14-122_12-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712458" version="1" comment="kgraft-patch-4_12_14-122_17-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712459" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712460" version="1" comment="kgraft-patch-4_12_14-122_7-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712461" version="1" comment="kernel-livepatch-4_12_14-150_17-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712462" version="1" comment="kernel-livepatch-4_12_14-150_22-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712463" version="1" comment="kernel-livepatch-4_12_14-150_27-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712464" version="1" comment="kernel-livepatch-4_12_14-150_32-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712465" version="1" comment="kernel-livepatch-4_12_14-150_35-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712466" version="1" comment="kernel-livepatch-4_12_14-150_38-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712467" version="1" comment="kernel-livepatch-4_12_14-150_41-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712468" version="1" comment="kernel-livepatch-4_12_14-150_47-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712469" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=11-31.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712470" version="1" comment="kernel-livepatch-4_12_14-197_10-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712471" version="1" comment="kernel-livepatch-4_12_14-197_15-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712472" version="1" comment="kernel-livepatch-4_12_14-197_18-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712473" version="1" comment="kernel-livepatch-4_12_14-197_21-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712474" version="1" comment="kernel-livepatch-4_12_14-197_26-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712475" version="1" comment="kernel-livepatch-4_12_14-197_29-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712476" version="1" comment="kernel-livepatch-4_12_14-197_34-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712477" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712478" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712479" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712480" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712481" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712482" version="1" comment="kernel-default is &lt;4.12.14-95.57.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712483" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712484" version="1" comment="kgraft-patch-4_12_14-122_23-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712485" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712486" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712487" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712488" version="1" comment="kernel-default is &lt;4.12.14-150.55.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712489" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712490" version="1" comment="kernel-livepatch-4_12_14-197_45-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712491" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712492" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712493" version="1" comment="kernel-default is &lt;4.12.14-197.51.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712494" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=2-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712495" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=2-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712496" version="1" comment="kgraft-patch-4_12_14-95_54-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712497" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712498" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712499" version="1" comment="kgraft-patch-4_12_14-122_23-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712500" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712501" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712502" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712503" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712504" version="1" comment="kernel-livepatch-4_12_14-197_45-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712505" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712506" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712507" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712508" version="1" comment="kernel-default is &lt;4.12.14-197.56.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712509" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=3-8.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712510" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712511" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744216" version="1" comment="qemu is &lt;5.2.0-150300.121.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151104" version="1" comment="qemu is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744217" version="1" comment="qemu-arm is &lt;5.2.0-150300.121.2 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151105" version="1" comment="qemu-arm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744220" version="1" comment="qemu-audio-spice is &lt;5.2.0-150300.121.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623393" version="1" comment="qemu-audio-spice is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744226" version="1" comment="qemu-chardev-spice is &lt;5.2.0-150300.121.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623395" version="1" comment="qemu-chardev-spice is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744227" version="1" comment="qemu-guest-agent is &lt;5.2.0-150300.121.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153019" version="1" comment="qemu-guest-agent is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744228" version="1" comment="qemu-hw-display-qxl is &lt;5.2.0-150300.121.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623396" version="1" comment="qemu-hw-display-qxl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744488" version="1" comment="qemu-hw-display-virtio-gpu is &lt;5.2.0-150300.121.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623397" version="1" comment="qemu-hw-display-virtio-gpu is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744231" version="1" comment="qemu-hw-display-virtio-vga is &lt;5.2.0-150300.121.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623399" version="1" comment="qemu-hw-display-virtio-vga is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744232" version="1" comment="qemu-hw-usb-redirect is &lt;5.2.0-150300.121.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623401" version="1" comment="qemu-hw-usb-redirect is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744233" version="1" comment="qemu-ipxe is &lt;1.0.0+-150300.121.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151109" version="1" comment="qemu-ipxe is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744237" version="1" comment="qemu-seabios is &lt;1.14.0_0_g155821a-150300.121.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151115" version="1" comment="qemu-seabios is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744238" version="1" comment="qemu-sgabios is &lt;8-150300.121.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151116" version="1" comment="qemu-sgabios is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744239" version="1" comment="qemu-tools is &lt;5.2.0-150300.121.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151117" version="1" comment="qemu-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744242" version="1" comment="qemu-ui-opengl is &lt;5.2.0-150300.121.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623406" version="1" comment="qemu-ui-opengl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744244" version="1" comment="qemu-ui-spice-core is &lt;5.2.0-150300.121.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623407" version="1" comment="qemu-ui-spice-core is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744245" version="1" comment="qemu-vgabios is &lt;1.14.0_0_g155821a-150300.121.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151118" version="1" comment="qemu-vgabios is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744246" version="1" comment="qemu-x86 is &lt;5.2.0-150300.121.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151119" version="1" comment="qemu-x86 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712512" version="1" comment="kernel-default is &lt;4.12.14-197.45.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482053" version="1" comment="kernel-default is &lt;5.3.18-22.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721862" version="1" comment="kernel-default is &lt;5.3.18-150300.59.98.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721863" version="1" comment="kernel-default-base is &lt;5.3.18-150300.59.98.1.150300.18.56.3 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712513" version="1" comment="kgraft-patch-4_12_14-95_48-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712514" version="1" comment="kgraft-patch-4_12_14-122_17-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712515" version="1" comment="kernel-livepatch-4_12_14-197_34-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712516" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707511" version="1" comment="libicu-suse65_1 is &lt;65.1-150200.4.5.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710085" version="1" comment="libicu-suse65_1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707447" version="1" comment="libicu65_1-ledata is &lt;65.1-150200.4.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710088" version="1" comment="libicu65_1-ledata is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712517" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712518" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699101" version="1" comment="python3-M2Crypto is &lt;0.35.2-150000.3.14.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702053" version="1" comment="python3-M2Crypto is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721522" version="1" comment="python3-rsa is &lt;3.4.2-150000.3.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009479910" version="1" comment="python3-rsa is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009739829" version="1" comment="python3-cryptography is &lt;3.3.2-150200.16.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712519" version="1" comment="kgraft-patch-4_12_14-95_45-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712520" version="1" comment="kgraft-patch-4_12_14-95_48-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712521" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712522" version="1" comment="kgraft-patch-4_12_14-95_54-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712523" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712524" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712525" version="1" comment="kgraft-patch-4_12_14-120-default is &gt;=9-3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712526" version="1" comment="kgraft-patch-4_12_14-122_12-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712527" version="1" comment="kgraft-patch-4_12_14-122_17-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712528" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712529" version="1" comment="kgraft-patch-4_12_14-122_23-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712530" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712531" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712532" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712533" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712534" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712535" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712536" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712537" version="1" comment="kgraft-patch-4_12_14-122_7-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712538" version="1" comment="kernel-livepatch-4_12_14-150_47-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712539" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712540" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712541" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712542" version="1" comment="kernel-livepatch-4_12_14-197_29-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712543" version="1" comment="kernel-livepatch-4_12_14-197_34-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712544" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712545" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712546" version="1" comment="kernel-livepatch-4_12_14-197_45-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712547" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712548" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712549" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712550" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712551" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712552" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712553" version="1" comment="kernel-default is &lt;4.12.14-197.67.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712554" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=5-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712555" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712556" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712557" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712558" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712559" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712560" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712561" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712562" version="1" comment="kernel-default is &lt;4.12.14-95.71.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712563" version="1" comment="kernel-default is ==4.12.14-122.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712564" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712565" version="1" comment="kernel-default is ==4.12.14-122.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712566" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712567" version="1" comment="kernel-default is &lt;4.12.14-122.63.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712568" version="1" comment="kernel-default is ==4.12.14-197.83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712569" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712570" version="1" comment="kernel-default is ==4.12.14-197.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712571" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712572" version="1" comment="kernel-default is &lt;4.12.14-197.86.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712573" version="1" comment="kernel-default is ==5.3.18-24.49.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712574" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712575" version="1" comment="kernel-default is ==5.3.18-24.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712576" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712577" version="1" comment="kernel-default is &lt;5.3.18-24.52.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698763" version="1" comment="kernel-default is ==5.3.18-57.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712578" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=10-3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628531" version="1" comment="kernel-default is &lt;5.3.18-57.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705466" version="1" comment="kernel-default is &lt;5.3.18-150300.59.76.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705467" version="1" comment="kernel-default-base is &lt;5.3.18-150300.59.76.1.150300.18.45.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712579" version="1" comment="kgraft-patch-4_12_14-95_48-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712580" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712581" version="1" comment="kgraft-patch-4_12_14-95_54-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712582" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712583" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712584" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712585" version="1" comment="kgraft-patch-4_12_14-122_17-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712586" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712587" version="1" comment="kgraft-patch-4_12_14-122_23-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712588" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712589" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712590" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712591" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712592" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712593" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712594" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712595" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712596" version="1" comment="kernel-default is ==4.12.14-122.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712597" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712598" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712599" version="1" comment="kernel-default is &lt;4.12.14-122.60.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712600" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712601" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712602" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712603" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712604" version="1" comment="kernel-livepatch-4_12_14-197_34-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712605" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712606" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712607" version="1" comment="kernel-livepatch-4_12_14-197_45-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712608" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712609" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712610" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712611" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712612" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712613" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712614" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712615" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712616" version="1" comment="kernel-default is ==4.12.14-197.78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712617" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712618" version="1" comment="kernel-default is &lt;4.12.14-197.78.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712619" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=8-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712620" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712621" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712622" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712623" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712624" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712625" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712626" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712627" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744039" version="1" comment="slirp4netns is &lt;0.4.7-150100.3.18.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266793" version="1" comment="slirp4netns is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705477" version="1" comment="libp11-kit0 is &lt;0.23.2-150000.4.16.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661793" version="1" comment="libp11-kit0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705478" version="1" comment="p11-kit is &lt;0.23.2-150000.4.16.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661795" version="1" comment="p11-kit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705479" version="1" comment="p11-kit-tools is &lt;0.23.2-150000.4.16.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661800" version="1" comment="p11-kit-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712628" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712629" version="1" comment="kernel-default is &lt;4.12.14-95.68.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712630" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712631" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712632" version="1" comment="kernel-default is &lt;4.12.14-150.66.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712633" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712634" version="1" comment="kernel-default is &lt;4.12.14-197.83.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712635" version="1" comment="kernel-default is ==5.3.18-24.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712636" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712637" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712638" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=6-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712639" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712640" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712641" version="1" comment="kernel-default is &lt;4.12.14-122.57.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712642" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710427" version="1" comment="libjpeg8 is &lt;8.1.2-150000.32.5.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152543" version="1" comment="libjpeg8 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712643" version="1" comment="kgraft-patch-4_12_14-95_54-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712644" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712645" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712646" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712647" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712648" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712649" version="1" comment="kgraft-patch-4_12_14-122_23-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712650" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712651" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712652" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712653" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712654" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712655" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712656" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712657" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712658" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712659" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712660" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712661" version="1" comment="kernel-default is ==4.12.14-122.66.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712662" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712663" version="1" comment="kernel-default is &lt;4.12.14-122.66.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712664" version="1" comment="kernel-livepatch-4_12_14-197_45-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712665" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712666" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712667" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712668" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712669" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712670" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712671" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712672" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712673" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712674" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712675" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712676" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=11-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712677" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712678" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712679" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712680" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712681" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712682" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712683" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712684" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712685" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712686" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698736" version="1" comment="kernel-default is ==5.3.18-24.53.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712687" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712688" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712689" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=2-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712690" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712691" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712692" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712693" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712694" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712695" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712696" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712697" version="1" comment="kernel-default is &lt;4.12.14-95.77.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712698" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712699" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712700" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712701" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712702" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712703" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712704" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712705" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712706" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712707" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712708" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698703" version="1" comment="kernel-default is ==4.12.14-122.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712709" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698705" version="1" comment="kernel-default is ==4.12.14-122.74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712710" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698707" version="1" comment="kernel-default is ==4.12.14-122.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712711" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712712" version="1" comment="kernel-default is &lt;4.12.14-122.77.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712713" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712714" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712715" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712716" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712717" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712718" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712719" version="1" comment="kernel-default is &lt;4.12.14-150.72.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712720" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712721" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712722" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712723" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712724" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712725" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712726" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712727" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712728" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712729" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712730" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698729" version="1" comment="kernel-default is ==4.12.14-197.89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712731" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698731" version="1" comment="kernel-default is ==4.12.14-197.92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712732" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712733" version="1" comment="kernel-default is &lt;4.12.14-197.92.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712734" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=14-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712735" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712736" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712737" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712738" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712739" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712740" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712741" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712742" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712743" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712744" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698791" version="1" comment="kernel-default is ==5.3.18-24.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712745" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698738" version="1" comment="kernel-default is ==5.3.18-24.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712746" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698740" version="1" comment="kernel-default is ==5.3.18-24.67.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712747" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712748" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712749" version="1" comment="kernel-default is ==4.12.14-95.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712750" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712751" version="1" comment="kernel-default is ==4.12.14-95.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712752" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712753" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=13-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701405" version="1" comment="kernel-default is ==4.12.14-95.88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712754" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=9-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701143" version="1" comment="kernel-default is ==4.12.14-95.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712755" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=8-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701407" version="1" comment="kernel-default is ==4.12.14-95.96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712756" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=7-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701145" version="1" comment="kernel-default is ==4.12.14-95.99.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712757" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701147" version="1" comment="kernel-default is &lt;4.12.14-95.99.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698699" version="1" comment="kernel-default is ==4.12.14-122.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712758" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=14-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698701" version="1" comment="kernel-default is ==4.12.14-122.106.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712759" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=12-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701411" version="1" comment="kernel-default is ==4.12.14-122.110.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712760" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=10-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701413" version="1" comment="kernel-default is ==4.12.14-122.113.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712761" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=9-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701148" version="1" comment="kernel-default is ==4.12.14-122.116.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712762" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=7-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701415" version="1" comment="kernel-default is ==4.12.14-122.121.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712763" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=5-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701150" version="1" comment="kernel-default is ==4.12.14-122.124.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712764" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712765" version="1" comment="kernel-default is ==4.12.14-122.127.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712766" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712767" version="1" comment="kernel-default is ==4.12.14-122.130.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712768" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698713" version="1" comment="kernel-default is ==4.12.14-122.88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712769" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=16-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698715" version="1" comment="kernel-default is ==4.12.14-122.91.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712770" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=16-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698717" version="1" comment="kernel-default is ==4.12.14-122.98.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712771" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=14-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698719" version="1" comment="kernel-default is &lt;4.12.14-122.98.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701421" version="1" comment="kernel-default is ==4.12.14-150000.150.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712772" version="1" comment="kernel-livepatch-4_12_14-150000_150_89-default is &gt;=7-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701260" version="1" comment="kernel-default is ==4.12.14-150000.150.92.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712773" version="1" comment="kernel-livepatch-4_12_14-150000_150_92-default is &gt;=4-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712774" version="1" comment="kernel-default is ==4.12.14-150000.150.95.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712775" version="1" comment="kernel-livepatch-4_12_14-150000_150_95-default is &gt;=2-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712776" version="1" comment="kernel-default is ==4.12.14-150000.150.98.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712777" version="1" comment="kernel-livepatch-4_12_14-150000_150_98-default is &gt;=2-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712778" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=13-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701262" version="1" comment="kernel-default is ==4.12.14-150.83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712779" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=9-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701425" version="1" comment="kernel-default is ==4.12.14-150.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712780" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=8-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701427" version="1" comment="kernel-default is &lt;4.12.14-150.86.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701265" version="1" comment="kernel-default is ==4.12.14-150100.197.111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712781" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=7-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701154" version="1" comment="kernel-default is ==4.12.14-150100.197.114.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712782" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712783" version="1" comment="kernel-default is ==4.12.14-150100.197.117.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712784" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712785" version="1" comment="kernel-default is ==4.12.14-150100.197.120.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712786" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698727" version="1" comment="kernel-default is ==4.12.14-197.102.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712787" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=13-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701428" version="1" comment="kernel-default is ==4.12.14-197.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712788" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=9-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701268" version="1" comment="kernel-default is ==4.12.14-197.108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712789" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=8-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701270" version="1" comment="kernel-default is &lt;4.12.14-197.108.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698822" version="1" comment="kernel-default is ==5.3.18-150200.24.112.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712790" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=7-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698824" version="1" comment="kernel-default is ==5.3.18-150200.24.115.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712791" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709908" version="1" comment="kernel-default is ==5.3.18-150200.24.126.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709909" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698786" version="1" comment="kernel-default is ==5.3.18-24.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712792" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698788" version="1" comment="kernel-default is ==5.3.18-24.107.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712793" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698748" version="1" comment="kernel-default is ==5.3.18-24.83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712794" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698750" version="1" comment="kernel-default is ==5.3.18-24.86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712795" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698752" version="1" comment="kernel-default is ==5.3.18-24.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712796" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=15-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698754" version="1" comment="kernel-default is ==5.3.18-24.96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712797" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=14-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698756" version="1" comment="kernel-default is ==5.3.18-24.99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712798" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698758" version="1" comment="kernel-default is &lt;5.3.18-24.99.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698759" version="1" comment="kernel-default is ==5.3.18-150300.59.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712799" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698761" version="1" comment="kernel-default is ==5.3.18-150300.59.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712800" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698805" version="1" comment="kernel-default is ==5.3.18-150300.59.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712801" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698807" version="1" comment="kernel-default is ==5.3.18-150300.59.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712802" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698809" version="1" comment="kernel-default is ==5.3.18-150300.59.60.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712803" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698842" version="1" comment="kernel-default is ==5.3.18-150300.59.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712804" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698844" version="1" comment="kernel-default is ==5.3.18-150300.59.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712805" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698846" version="1" comment="kernel-default is ==5.3.18-150300.59.71.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712806" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701403" version="1" comment="kernel-default is ==5.3.18-150300.59.76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712807" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706111" version="1" comment="kernel-default is ==5.3.18-150300.59.87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712808" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698773" version="1" comment="kernel-default is ==5.3.18-59.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712809" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698775" version="1" comment="kernel-default is ==5.3.18-59.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712810" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698777" version="1" comment="kernel-default is ==5.3.18-59.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712811" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698779" version="1" comment="kernel-default is ==5.3.18-59.37.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712812" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698781" version="1" comment="kernel-default is ==5.3.18-59.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712813" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701452" version="1" comment="kernel-default is &lt;5.3.18-59.40.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698874" version="1" comment="kernel-default is ==5.14.21-150400.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712814" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=5-150400.4.12.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712815" version="1" comment="kernel-default is ==5.14.21-150400.24.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712816" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712817" version="1" comment="kernel-default is ==5.14.21-150400.24.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712818" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712819" version="1" comment="kernel-default is &lt;5.14.21-150400.24.18.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706514" version="1" comment="kernel-default is &lt;5.3.18-150300.59.90.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706515" version="1" comment="kernel-default-base is &lt;5.3.18-150300.59.90.1.150300.18.52.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707566" version="1" comment="kernel-rt is &lt;5.3.18-150300.99.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725853" version="1" comment="kernel-livepatch-4_12_14-150000_150_89-default is &gt;=9-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725854" version="1" comment="kernel-livepatch-4_12_14-150000_150_92-default is &gt;=6-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725497" version="1" comment="kernel-livepatch-4_12_14-150000_150_95-default is &gt;=4-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725855" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=15-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725856" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=11-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725857" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=10-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712820" version="1" comment="kernel-default is &lt;4.12.14-95.80.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712821" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712822" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712823" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712824" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698709" version="1" comment="kernel-default is ==4.12.14-122.80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712825" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698711" version="1" comment="kernel-default is ==4.12.14-122.83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712826" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712827" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712828" version="1" comment="kernel-default is &lt;4.12.14-122.88.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712829" version="1" comment="kernel-default is &lt;4.12.14-150.75.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712830" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712831" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698733" version="1" comment="kernel-default is ==4.12.14-197.99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712832" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698735" version="1" comment="kernel-default is &lt;4.12.14-197.99.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712833" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712834" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712835" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712836" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698742" version="1" comment="kernel-default is ==5.3.18-24.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712837" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698744" version="1" comment="kernel-default is ==5.3.18-24.75.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712838" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698746" version="1" comment="kernel-default is ==5.3.18-24.78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712839" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712840" version="1" comment="kernel-default is &lt;5.3.18-24.78.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698765" version="1" comment="kernel-default is ==5.3.18-59.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712841" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698767" version="1" comment="kernel-default is ==5.3.18-59.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712842" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698769" version="1" comment="kernel-default is ==5.3.18-59.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712843" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698771" version="1" comment="kernel-default is ==5.3.18-59.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712844" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698783" version="1" comment="kernel-default is ==5.3.18-59.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712845" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698785" version="1" comment="kernel-default is &lt;5.3.18-59.5.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712846" version="1" comment="kernel-default is &lt;4.12.14-197.64.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712847" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712848" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712849" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712850" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712851" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712852" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712853" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712854" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712855" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712856" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712857" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712858" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712859" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712860" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712861" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712862" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712863" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712864" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712865" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712866" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712867" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712868" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712869" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712870" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712871" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712872" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712873" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712874" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712875" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712876" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712877" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712878" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=8-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712879" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712880" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712881" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712882" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712883" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=13-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712884" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712885" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712886" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712887" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712888" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712889" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712890" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712891" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712892" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712893" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712894" version="1" comment="kernel-default is &lt;4.12.14-122.32.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712895" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712896" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712897" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712898" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712899" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712900" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712901" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712902" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712903" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712904" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712905" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712906" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712907" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712908" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712909" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712910" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712911" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712912" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712913" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712914" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712915" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712916" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712917" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712918" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712919" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712920" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712921" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712922" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712923" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712924" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712925" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712926" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712927" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712928" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712929" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712930" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712931" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712932" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712933" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712934" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712935" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712936" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712937" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712938" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712939" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=12-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712940" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712941" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712942" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712943" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712944" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712945" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712946" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712947" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712948" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712949" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712950" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712951" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712952" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712953" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712954" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712955" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712956" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712957" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712958" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712959" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712960" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712961" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712962" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712963" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712964" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712965" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712966" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712967" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712968" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712969" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712970" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712971" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712972" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712973" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712974" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712975" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712976" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712977" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712978" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712979" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712980" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712981" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712982" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712983" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712984" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712985" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712986" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712987" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712988" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712989" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712990" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712991" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712992" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712993" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712994" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712995" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712996" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712997" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712998" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712999" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713000" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713001" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713002" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713003" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713004" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713005" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713006" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713007" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713008" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713009" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713010" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713011" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713012" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713013" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713014" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713015" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713016" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713017" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713018" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713019" version="1" comment="kernel-default is &lt;5.3.18-24.53.4.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713020" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=9-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730379" version="1" comment="podman is &lt;4.3.1-150300.9.15.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266791" version="1" comment="podman is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730380" version="1" comment="podman-cni-config is &lt;4.3.1-150300.9.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266792" version="1" comment="podman-cni-config is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707377" version="1" comment="libspice-server1 is &lt;0.14.3-150300.3.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151923" version="1" comment="libspice-server1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009732693" version="1" comment="samba-client-libs is &lt;4.15.13+git.591.ab36624310c-150300.3.49.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666847" version="1" comment="samba-client-libs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713021" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713022" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713023" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713024" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713025" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713026" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713027" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713028" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713029" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713030" version="1" comment="kernel-default is &lt;5.3.18-24.93.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713031" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713032" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713033" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713034" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713035" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713036" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713037" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713038" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713041" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713042" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713043" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713044" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713045" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713046" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713047" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713048" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713049" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713050" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713051" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713052" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713053" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713054" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713055" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713056" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713057" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713058" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713059" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713060" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713061" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713062" version="1" comment="kernel-default is &lt;4.12.14-122.80.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713063" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713064" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713065" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713066" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713067" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713068" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713069" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713070" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713071" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713072" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713073" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713074" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713075" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713076" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713077" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713078" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713079" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713080" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713081" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713082" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713083" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713084" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713085" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713086" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713087" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713088" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713089" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713090" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713091" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713092" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713093" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713094" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713095" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713096" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713097" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713098" version="1" comment="kernel-default is &lt;5.3.18-24.75.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713099" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=5-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713100" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713101" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713102" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713103" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713104" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713105" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=4-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713106" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713107" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713108" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721859" version="1" comment="libprotobuf-lite20 is &lt;3.9.2-150200.4.19.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677903" version="1" comment="libprotobuf-lite20 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713109" version="1" comment="kernel-default is &lt;4.12.14-95.74.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713110" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713111" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713112" version="1" comment="kernel-default is &lt;4.12.14-122.71.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713113" version="1" comment="kernel-default is &lt;4.12.14-197.89.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713114" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713115" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713116" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713117" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=3-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713118" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713119" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713120" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713121" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713122" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713123" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713124" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713125" version="1" comment="kernel-default is &lt;5.3.18-24.64.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705486" version="1" comment="kernel-default is &lt;5.3.18-150300.59.87.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705487" version="1" comment="kernel-default-base is &lt;5.3.18-150300.59.87.1.150300.18.50.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698643" version="1" comment="kernel-rt is &lt;5.3.18-150300.96.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713126" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713127" version="1" comment="kgraft-patch-4_12_14-95_54-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713128" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713129" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713130" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713131" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713132" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713133" version="1" comment="kgraft-patch-4_12_14-122_23-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713134" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713135" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713136" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713137" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713138" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713139" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713140" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713141" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713142" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713143" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713144" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713145" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713146" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713147" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713148" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713149" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713150" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713151" version="1" comment="kernel-livepatch-4_12_14-197_45-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713152" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713153" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713154" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713155" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713156" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713157" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713158" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713159" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713160" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713161" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713162" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=10-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713163" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713164" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713165" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713166" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713167" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713168" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713169" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713170" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713171" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713172" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713173" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713174" version="1" comment="kgraft-patch-4_12_14-95_54-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713175" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713176" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713177" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713178" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713179" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713180" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713181" version="1" comment="kgraft-patch-4_12_14-122_23-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713182" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713183" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713184" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713185" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713186" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713187" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713188" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713189" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713190" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713191" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713192" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713193" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713194" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713195" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713196" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713197" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713198" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713199" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713200" version="1" comment="kernel-livepatch-4_12_14-197_45-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713201" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713202" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713203" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713204" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713205" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713206" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=5-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713207" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713208" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713209" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713210" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713211" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713212" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=9-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713213" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713214" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713215" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713216" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713217" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713218" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713219" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713220" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713221" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713222" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713223" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009734986" version="1" comment="glib2-tools is &lt;2.62.6-150200.3.10.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151144" version="1" comment="glib2-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009734987" version="1" comment="libgio-2_0-0 is &lt;2.62.6-150200.3.10.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151145" version="1" comment="libgio-2_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009734989" version="1" comment="libglib-2_0-0 is &lt;2.62.6-150200.3.10.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151147" version="1" comment="libglib-2_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009734991" version="1" comment="libgmodule-2_0-0 is &lt;2.62.6-150200.3.10.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151149" version="1" comment="libgmodule-2_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009734993" version="1" comment="libgobject-2_0-0 is &lt;2.62.6-150200.3.10.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151151" version="1" comment="libgobject-2_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713224" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713225" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713226" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713227" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718861" version="1" comment="xen-libs is &lt;4.14.5_06-150300.3.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151590" version="1" comment="xen-libs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716496" version="1" comment="libpython3_6m1_0 is &lt;3.6.15-150300.10.30.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716497" version="1" comment="python3 is &lt;3.6.15-150300.10.30.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716498" version="1" comment="python3-base is &lt;3.6.15-150300.10.30.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742111" version="1" comment="libxslt1 is &lt;1.1.32-150000.3.14.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155748" version="1" comment="libxslt1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713228" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=7-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713229" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713230" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713231" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713232" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713233" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713234" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713235" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713236" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713237" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713238" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713239" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713240" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713241" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713242" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713243" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713244" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713245" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713246" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713247" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713248" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713249" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713250" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713251" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713252" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713253" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713254" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713255" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713256" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713257" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713258" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713259" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713260" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713261" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713262" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=12-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713263" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713264" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713265" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713266" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713267" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713268" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713269" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713270" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713271" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713272" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713273" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725499" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725858" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725859" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725860" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725861" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725862" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725863" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725864" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725865" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725866" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725867" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725868" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725869" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725501" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725870" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725871" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=9-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725872" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=6-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725503" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725873" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=15-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725874" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725875" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=10-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725876" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725877" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725878" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=15-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725879" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=14-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725880" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=18-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725881" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725882" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725883" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725884" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725885" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725886" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725887" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725888" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725889" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725890" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725891" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725505" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725892" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=18-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725893" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725894" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725895" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=8-150400.4.21.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725506" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713798" version="1" comment="kernel-default is &lt;5.14.21-150400.24.11.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713274" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=8-3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713275" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713276" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713277" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713278" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713279" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713280" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710617" version="1" comment="gstreamer-plugins-base is &lt;1.16.3-150200.4.6.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153927" version="1" comment="gstreamer-plugins-base is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710618" version="1" comment="libgstallocators-1_0-0 is &lt;1.16.3-150200.4.6.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153932" version="1" comment="libgstallocators-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710619" version="1" comment="libgstapp-1_0-0 is &lt;1.16.3-150200.4.6.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153936" version="1" comment="libgstapp-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710620" version="1" comment="libgstaudio-1_0-0 is &lt;1.16.3-150200.4.6.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153938" version="1" comment="libgstaudio-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710621" version="1" comment="libgstgl-1_0-0 is &lt;1.16.3-150200.4.6.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153892" version="1" comment="libgstgl-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710622" version="1" comment="libgstpbutils-1_0-0 is &lt;1.16.3-150200.4.6.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153944" version="1" comment="libgstpbutils-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710623" version="1" comment="libgstriff-1_0-0 is &lt;1.16.3-150200.4.6.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153946" version="1" comment="libgstriff-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710624" version="1" comment="libgsttag-1_0-0 is &lt;1.16.3-150200.4.6.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153954" version="1" comment="libgsttag-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710625" version="1" comment="libgstvideo-1_0-0 is &lt;1.16.3-150200.4.6.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153956" version="1" comment="libgstvideo-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755256" version="1" comment="libxml2-2 is &lt;2.9.7-150000.3.57.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755259" version="1" comment="libxml2-tools is &lt;2.9.7-150000.3.57.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755260" version="1" comment="python3-libxml2-python is &lt;2.9.7-150000.3.57.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713281" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713282" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713283" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713284" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713285" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713286" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713287" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713288" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713289" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713290" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713291" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713292" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713293" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713294" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713295" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713296" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713297" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713298" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713299" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713300" version="1" comment="kernel-default is &lt;4.12.14-122.83.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713301" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713302" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713303" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713304" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713305" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713306" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713307" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713308" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713309" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713310" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713311" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713312" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713313" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713314" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713315" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713316" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713317" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713318" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713319" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713320" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713321" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713322" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713323" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713324" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713325" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713326" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713327" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713328" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713329" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713330" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713331" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713332" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713333" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713334" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713335" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713336" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707776" version="1" comment="libslirp0 is &lt;4.3.1-150300.11.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680725" version="1" comment="libslirp0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713337" version="1" comment="kernel-default is &lt;5.3.18-24.70.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727204" version="1" comment="libtpms0 is &lt;0.8.2-150300.3.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632653" version="1" comment="libtpms0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713338" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713339" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713340" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713341" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713342" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713343" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713344" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713345" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713346" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713347" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713348" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713349" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713350" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713351" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713352" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713353" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713354" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713355" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713356" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713357" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713358" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713359" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713360" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713361" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=10-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713362" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713363" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713364" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713365" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713366" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713367" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713368" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713369" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713370" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713371" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713372" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713373" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713374" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713375" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713376" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713377" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=14-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713378" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=14-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713379" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=12-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713380" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=12-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713381" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=12-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713382" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=11-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713383" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=11-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713384" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=10-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713385" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=9-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713386" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713387" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=6-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713388" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=6-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713389" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713390" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713391" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=3-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713392" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=2-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713393" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=6-3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713394" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713395" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713396" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=3-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713397" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=2-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713398" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711219" version="1" comment="libsqlite3-0 is &lt;3.39.3-150000.3.17.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153745" version="1" comment="libsqlite3-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713399" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713400" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713401" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713402" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713403" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713404" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713405" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713406" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009754366" version="1" comment="libwayland-client0 is &lt;1.18.0-150200.3.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009754352" version="1" comment="libwayland-client0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009754368" version="1" comment="libwayland-cursor0 is &lt;1.18.0-150200.3.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009754354" version="1" comment="libwayland-cursor0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009754369" version="1" comment="libwayland-egl1 is &lt;99~1.18.0-150200.3.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009754356" version="1" comment="libwayland-egl1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009754370" version="1" comment="libwayland-server0 is &lt;1.18.0-150200.3.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009754358" version="1" comment="libwayland-server0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726770" version="1" comment="vim-data-common is &lt;9.0.0814-150000.5.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177135" version="1" comment="vim-data-common is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726850" version="1" comment="vim-small is &lt;9.0.0814-150000.5.28.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670993" version="1" comment="vim-small is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713407" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698825" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=2-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716156" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=3-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718697" version="1" comment="kernel-default is ==5.3.18-150200.24.129.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718698" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725507" version="1" comment="kernel-default is ==5.3.18-150200.24.134.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725508" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713408" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713409" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713410" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713411" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713412" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713413" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713414" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713415" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713416" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713417" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713418" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713419" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713420" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713421" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713422" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713423" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713424" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713425" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713426" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713427" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713428" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701443" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=3-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701404" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706112" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709695" version="1" comment="kernel-default is ==5.3.18-150300.59.90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715597" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=3-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715598" version="1" comment="kernel-default is ==5.3.18-150300.59.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715599" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725509" version="1" comment="kernel-default is ==5.3.18-150300.59.98.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725510" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713429" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=14-150200.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713430" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713431" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713432" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713433" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713434" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713435" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713436" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713437" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713438" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713439" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698875" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=2-150400.4.3.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715600" version="1" comment="kernel-default is ==5.14.21-150400.24.21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715601" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=2-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725511" version="1" comment="kernel-default is ==5.14.21-150400.24.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725512" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729488" version="1" comment="kernel-default is ==5.14.21-150400.24.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729489" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729490" version="1" comment="kernel-default is &lt;5.14.21-150400.24.33.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713440" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713441" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713442" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713443" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713444" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713445" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713446" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713447" version="1" comment="kernel-default is &lt;4.12.14-95.96.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713448" version="1" comment="kernel-livepatch-4_12_14-150000_150_89-default is &gt;=2-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713449" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=15-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713450" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=12-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713451" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=7-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713452" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=4-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713453" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=3-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714703" version="1" comment="libfmt8 is &lt;8.0.1-150300.7.5.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729428" version="1" comment="libfmt8 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714704" version="1" comment="librados2 is &lt;16.2.9.536+g41a9f9a5573-150300.6.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154240" version="1" comment="librados2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714705" version="1" comment="librbd1 is &lt;16.2.9.536+g41a9f9a5573-150300.6.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154244" version="1" comment="librbd1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713454" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=13-150200.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713455" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713456" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713457" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713458" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713459" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713460" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713461" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713462" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713463" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713464" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=4-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713465" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=4-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724521" version="1" comment="kernel-default is &lt;5.3.18-150300.59.101.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724522" version="1" comment="kernel-default-base is &lt;5.3.18-150300.59.101.1.150300.18.58.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724435" version="1" comment="kernel-rt is &lt;5.3.18-150300.109.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713466" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713467" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713468" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713469" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713470" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713471" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713472" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713473" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713474" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713475" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713476" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713477" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713478" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713479" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713480" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713481" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713482" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713483" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713484" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713485" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713486" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713487" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713488" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713489" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713490" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713491" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713492" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713493" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713494" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713495" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713496" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713497" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713498" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713499" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713500" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713501" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713502" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713503" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713504" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713505" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713506" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713507" version="1" comment="kernel-default is &lt;5.3.18-24.96.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713508" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=11-3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713509" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713510" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713511" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713512" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713513" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=5-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713514" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=5-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713515" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=4-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713516" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=3-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713517" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=3-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713518" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713519" version="1" comment="kernel-default is &lt;4.12.14-122.91.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713520" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713521" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713522" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713523" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713524" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713525" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=2-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713526" version="1" comment="kernel-default is &lt;5.3.18-24.86.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713527" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716330" version="1" comment="libcolord2 is &lt;1.4.4-150200.4.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151659" version="1" comment="libcolord2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713528" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713529" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713530" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709963" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.40.0-150200.3.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151616" version="1" comment="gdk-pixbuf-query-loaders is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709965" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.40.0-150200.3.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151618" version="1" comment="libgdk_pixbuf-2_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709966" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.40.0-150200.3.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151620" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710626" version="1" comment="libtirpc-netconfig is &lt;1.2.6-150300.3.14.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155752" version="1" comment="libtirpc-netconfig is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710627" version="1" comment="libtirpc3 is &lt;1.2.6-150300.3.14.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155753" version="1" comment="libtirpc3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707508" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.40.0-150200.3.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707509" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.40.0-150200.3.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707510" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.40.0-150200.3.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721360" version="1" comment="libtasn1 is &lt;4.13-150000.4.8.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152119" version="1" comment="libtasn1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721361" version="1" comment="libtasn1-6 is &lt;4.13-150000.4.8.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152120" version="1" comment="libtasn1-6 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713531" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713532" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713533" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=3-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713534" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713535" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698691" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=16-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698693" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698695" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698697" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698700" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698702" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698704" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=16-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698706" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698708" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698710" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698712" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698714" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698716" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698718" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698721" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=16-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698723" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=13-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698725" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=8-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698728" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=8-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698730" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=16-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698732" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=15-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698734" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=13-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698737" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698739" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=16-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698741" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698743" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698745" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698747" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698749" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698751" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698753" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698755" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698757" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698760" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698762" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698764" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=16-150200.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698766" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698768" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698770" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698772" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698774" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698776" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698778" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698780" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698782" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698784" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713536" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713537" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713538" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713539" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713540" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713541" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713542" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713543" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713544" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713545" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713546" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713547" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713548" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713549" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713550" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713551" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713552" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713553" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713554" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=13-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713555" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=10-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713556" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=5-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713557" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=5-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713558" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=13-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713559" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=12-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713560" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=10-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713561" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713562" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713563" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713564" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713565" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713566" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713567" version="1" comment="kernel-default is &lt;4.12.14-95.88.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713568" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713569" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=2-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701264" version="1" comment="kernel-default is &lt;4.12.14-150.83.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713570" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713571" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713572" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713573" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713574" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713575" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713576" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713577" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713578" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713579" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713580" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713581" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713582" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718763" version="1" comment="libtiff5 is &lt;4.0.9-150000.45.16.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151317" version="1" comment="libtiff5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750861" version="1" comment="librados2 is &lt;16.2.11.58+g38d6afd3b78-150300.5.7.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750862" version="1" comment="librbd1 is &lt;16.2.11.58+g38d6afd3b78-150300.5.7.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713583" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713584" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713585" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713586" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713587" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713588" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=16-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713589" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713590" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713591" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713592" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713593" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713594" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713595" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713596" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713597" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713598" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=7-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713599" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713600" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713601" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=15-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713602" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=14-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713603" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=12-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698787" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698789" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698790" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698792" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=15-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698793" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=15-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698794" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698795" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698796" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698797" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698798" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698799" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698800" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698801" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698802" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698803" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698804" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698806" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698808" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698810" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698811" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=15-150200.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698812" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698813" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698814" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698815" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698816" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698817" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698818" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698819" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698820" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698821" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713604" version="1" comment="kernel-default is &lt;4.12.14-95.93.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009685665" version="1" comment="kernel-default is &lt;5.14.21-150400.22.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713605" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713606" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713607" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713608" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713609" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713610" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713611" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713612" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713613" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713614" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713615" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713616" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713617" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713618" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713619" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713620" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713621" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=14-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713622" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=9-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713623" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=5-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713624" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=4-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713625" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=9-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713626" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=5-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713627" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=4-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713628" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=16-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713629" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=14-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713630" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=8-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713631" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=7-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713632" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713633" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713634" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713635" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=15-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713636" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=14-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713637" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713638" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713639" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713640" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713641" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=9-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713642" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713643" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713644" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713645" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713646" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713647" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=18-150200.3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713648" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713649" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713650" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713651" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713652" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713653" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713654" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713655" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713656" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713657" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698823" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=4-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698826" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=9-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698827" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=8-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698828" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698829" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698830" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698831" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=15-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698832" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698833" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698834" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698835" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698836" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698837" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698838" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698839" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698840" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698841" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698843" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=4-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698845" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=3-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698847" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709696" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698848" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=19-150200.3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698849" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698850" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698851" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698852" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698853" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698854" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698855" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698856" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698857" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698858" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713658" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713659" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713660" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713661" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713662" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705816" version="1" comment="podman is &lt;3.4.7-150300.9.9.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705632" version="1" comment="podman-cni-config is &lt;3.4.7-150300.9.9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713663" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713664" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713665" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713666" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713667" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713668" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713669" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713670" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713671" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713672" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713673" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713674" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713675" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713676" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=15-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713677" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=15-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713678" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=15-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713679" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713680" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713681" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713682" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713683" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713684" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713685" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713686" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713687" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713688" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713689" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713690" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713691" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=17-150200.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713692" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713693" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713694" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713695" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713696" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713697" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713698" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713699" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713700" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713701" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009693048" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1d-150200.11.48.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231072" version="1" comment="libopenssl-1_1-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009693049" version="1" comment="libopenssl1_1 is &lt;1.1.1d-150200.11.48.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177120" version="1" comment="libopenssl1_1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009693050" version="1" comment="libopenssl1_1-hmac is &lt;1.1.1d-150200.11.48.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231074" version="1" comment="libopenssl1_1-hmac is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009693051" version="1" comment="openssl-1_1 is &lt;1.1.1d-150200.11.48.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177122" version="1" comment="openssl-1_1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713702" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713703" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713704" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713705" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713706" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713707" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713708" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713709" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713710" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713711" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=17-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713712" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713713" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713714" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713715" version="1" comment="kernel-livepatch-4_12_14-150000_150_89-default is &gt;=6-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713716" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=12-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713717" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=8-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713718" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=7-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713719" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=6-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713720" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=12-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713721" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=8-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713722" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=7-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009692654" version="1" comment="libpcre1 is &lt;8.45-150000.20.13.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152526" version="1" comment="libpcre1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709824" version="1" comment="samba-client-libs is &lt;4.15.8+git.527.8d0c05d313e-150300.3.40.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714500" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714501" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714502" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715338" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715339" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715340" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715603" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714503" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715341" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714504" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715342" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=17-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714505" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=17-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714506" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715811" version="1" comment="kernel-livepatch-4_12_14-150000_150_89-default is &gt;=8-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715604" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=14-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715605" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=10-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714507" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=9-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714508" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=8-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715606" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=14-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714509" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=10-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715607" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=9-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716236" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=8-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716237" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715812" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715813" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715814" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716238" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716239" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=15-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716240" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=14-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716157" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715815" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714900" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716158" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715608" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715609" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716159" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715610" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715611" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715612" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715816" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715817" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714902" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=6-150400.4.15.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713723" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713724" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713725" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713726" version="1" comment="kernel-livepatch-4_12_14-150000_150_92-default is &gt;=3-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713727" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713728" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=6-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713729" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713730" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713731" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713732" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713733" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=15-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713734" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=15-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713735" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=14-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713736" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713737" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713738" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713739" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713740" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713741" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713742" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713743" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713744" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=5-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713745" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713746" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713747" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713748" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713749" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713750" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713751" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713752" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713753" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=4-150400.4.9.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705472" version="1" comment="ignition is &lt;2.14.0-150300.6.7.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705498" version="1" comment="ignition is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705473" version="1" comment="ignition-dracut-grub2 is &lt;2.14.0-150300.6.7.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705499" version="1" comment="ignition-dracut-grub2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698507" version="1" comment="systemd-presets-common-SUSE is &lt;15-150100.8.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707504" version="1" comment="systemd-presets-common-SUSE is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728998" version="1" comment="conmon is &lt;2.1.5-150300.8.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009280795" version="1" comment="conmon is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709663" version="1" comment="vim-data-common is &lt;9.0.0313-150000.5.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709823" version="1" comment="vim-small is &lt;9.0.0313-150000.5.25.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701141" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=16-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701142" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=11-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701406" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=7-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701144" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=6-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701408" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=5-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701146" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701409" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=12-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701410" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=10-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701412" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=8-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701414" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=7-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701149" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=5-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701416" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=3-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701417" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=18-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701418" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=17-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701419" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=16-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701420" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=14-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701152" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=14-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701153" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=12-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701422" version="1" comment="kernel-livepatch-4_12_14-150000_150_89-default is &gt;=5-150000.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701423" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=16-150000.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701424" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=11-150000.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701263" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=7-150000.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701426" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=6-150000.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701266" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=5-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701267" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=11-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701429" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=7-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701269" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=6-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701430" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=16-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701271" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=5-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701431" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=10-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701272" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=9-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701432" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=18-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701273" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=17-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701433" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=16-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701274" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=14-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701434" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=14-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701435" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=13-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701275" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=12-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701276" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=11-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701436" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=11-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701437" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=11-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701438" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=10-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701439" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=9-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701440" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=8-150300.3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701441" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=5-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701442" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=4-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701444" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=18-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701445" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=17-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701446" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=16-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701447" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=14-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701448" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=14-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701449" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=13-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701450" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=12-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701451" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=12-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701453" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=3-150400.4.6.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713754" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713755" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713756" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713757" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713758" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713759" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713760" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713761" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713762" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713763" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713764" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713765" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=17-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713766" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713767" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713768" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713769" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713770" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713771" version="1" comment="kernel-livepatch-4_12_14-150000_150_89-default is &gt;=4-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713772" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=15-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713773" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=10-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713774" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=6-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713775" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=5-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713776" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=4-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713777" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=10-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713778" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=6-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713779" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=5-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713780" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=15-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725514" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701151" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701261" version="1" comment="kernel-livepatch-4_12_14-150000_150_92-default is &gt;=2-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701155" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701157" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703896" version="1" comment="libldb2 is &lt;2.4.3-150300.3.20.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291435" version="1" comment="libldb2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728218" version="1" comment="samba-client-libs is &lt;4.15.12+git.535.7750e5c95ef-150300.3.43.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705497" version="1" comment="libtiff5 is &lt;4.0.9-150000.45.11.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699141" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1d-150200.11.51.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699142" version="1" comment="libopenssl1_1 is &lt;1.1.1d-150200.11.51.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699143" version="1" comment="libopenssl1_1-hmac is &lt;1.1.1d-150200.11.51.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699144" version="1" comment="openssl-1_1 is &lt;1.1.1d-150200.11.51.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702471" version="1" comment="xen-libs is &lt;4.14.5_04-150300.3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009739934" version="1" comment="ucode-intel is &lt;20230214-150200.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169251" version="1" comment="ucode-intel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706876" version="1" comment="ucode-intel is &lt;20220809-150200.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713781" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713782" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713783" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713784" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713785" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713786" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713787" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713788" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713789" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713790" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713791" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713792" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=6-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713793" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713794" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713795" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=14-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713796" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=13-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713797" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=11-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705468" version="1" comment="python3-salt is &lt;3004-150300.53.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174860" version="1" comment="python3-salt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705469" version="1" comment="salt is &lt;3004-150300.53.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153592" version="1" comment="salt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705470" version="1" comment="salt-minion is &lt;3004-150300.53.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153599" version="1" comment="salt-minion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705471" version="1" comment="salt-transactional-update is &lt;3004-150300.53.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009479908" version="1" comment="salt-transactional-update is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669199" version="1" comment="wpa_supplicant is &lt;2.9-4.33.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152145" version="1" comment="wpa_supplicant is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744976" version="1" comment="containerd is &lt;1.6.16-150000.82.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153864" version="1" comment="containerd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009732313" version="1" comment="libfreebl3 is &lt;3.79.3-150000.3.90.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151498" version="1" comment="libfreebl3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009732315" version="1" comment="libfreebl3-hmac is &lt;3.79.3-150000.3.90.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244408" version="1" comment="libfreebl3-hmac is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009732317" version="1" comment="libsoftokn3 is &lt;3.79.3-150000.3.90.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151499" version="1" comment="libsoftokn3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009732319" version="1" comment="libsoftokn3-hmac is &lt;3.79.3-150000.3.90.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244410" version="1" comment="libsoftokn3-hmac is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009732321" version="1" comment="mozilla-nss is &lt;3.79.3-150000.3.90.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151500" version="1" comment="mozilla-nss is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009732323" version="1" comment="mozilla-nss-certs is &lt;3.79.3-150000.3.90.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151501" version="1" comment="mozilla-nss-certs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009732328" version="1" comment="mozilla-nss-tools is &lt;3.79.3-150000.3.90.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151503" version="1" comment="mozilla-nss-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009731091" version="1" comment="python3-certifi is &lt;2018.1.18-150000.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009734983" version="1" comment="python3-certifi is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009733697" version="1" comment="xen-libs is &lt;4.14.5_10-150300.3.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706516" version="1" comment="libyajl2 is &lt;2.1.0-150000.4.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710095" version="1" comment="libyajl2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705700" version="1" comment="gnutls is &lt;3.6.7-150200.14.19.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151156" version="1" comment="gnutls is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705702" version="1" comment="libgnutls30 is &lt;3.6.7-150200.14.19.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177128" version="1" comment="libgnutls30 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705703" version="1" comment="libgnutls30-hmac is &lt;3.6.7-150200.14.19.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009281488" version="1" comment="libgnutls30-hmac is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725516" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725518" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725520" version="1" comment="kernel-livepatch-4_12_14-150000_150_98-default is &gt;=4-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725522" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725524" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725526" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726393" version="1" comment="grub2 is &lt;2.04-150300.22.25.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153175" version="1" comment="grub2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726212" version="1" comment="grub2-arm64-efi is &lt;2.04-150300.22.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623763" version="1" comment="grub2-arm64-efi is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726213" version="1" comment="grub2-i386-pc is &lt;2.04-150300.22.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153178" version="1" comment="grub2-i386-pc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726216" version="1" comment="grub2-snapper-plugin is &lt;2.04-150300.22.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153179" version="1" comment="grub2-snapper-plugin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726218" version="1" comment="grub2-x86_64-efi is &lt;2.04-150300.22.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153180" version="1" comment="grub2-x86_64-efi is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726221" version="1" comment="grub2-x86_64-xen is &lt;2.04-150300.22.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153181" version="1" comment="grub2-x86_64-xen is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737234" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737179" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737180" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737181" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737182" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737235" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737236" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737318" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=18-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729590" version="1" comment="kernel-default is ==5.3.18-150300.59.101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009738271" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737319" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=18-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737320" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=18-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737321" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737610" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737611" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737612" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737322" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737323" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737324" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737364" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737238" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737239" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737365" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729113" version="1" comment="kernel-default is &lt;5.3.18-150300.59.98.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737366" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=10-150400.4.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737613" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737367" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009738272" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737368" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737614" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729181" version="1" comment="kernel-default is &lt;5.3.18-150300.59.106.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729182" version="1" comment="kernel-default-base is &lt;5.3.18-150300.59.106.1.150300.18.60.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729347" version="1" comment="kernel-rt is &lt;5.3.18-150300.112.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728138" version="1" comment="containerd is &lt;1.6.12-150000.79.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708370" version="1" comment="libfreetype6 is &lt;2.10.4-150000.4.12.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151248" version="1" comment="libfreetype6 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713799" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713800" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713801" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713802" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713803" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713804" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713805" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713806" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713807" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=14-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713808" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=11-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713809" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=6-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713810" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=3-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713811" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=2-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755034" version="1" comment="shim is &lt;15.7-150300.4.16.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152144" version="1" comment="shim is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706912" version="1" comment="rsync is &lt;3.1.3-150000.4.13.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151567" version="1" comment="rsync is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705481" version="1" comment="libncurses6 is &lt;6.1-150000.5.12.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158858" version="1" comment="libncurses6 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705482" version="1" comment="ncurses-utils is &lt;6.1-150000.5.12.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158863" version="1" comment="ncurses-utils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705483" version="1" comment="terminfo is &lt;6.1-150000.5.12.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158865" version="1" comment="terminfo is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705484" version="1" comment="terminfo-base is &lt;6.1-150000.5.12.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158866" version="1" comment="terminfo-base is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715614" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715615" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715343" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714903" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=5-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714904" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=3-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714905" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=3-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716160" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=6-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715818" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714906" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=5-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715344" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=4-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715616" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=3-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729566" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729567" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729771" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729491" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=17-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729492" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729493" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729494" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729568" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=17-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729569" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=16-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729570" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=12-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729571" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=11-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729496" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=16-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729497" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=12-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729498" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729772" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729773" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=15-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729774" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729572" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729573" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729499" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729574" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729500" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729575" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=19-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729576" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=18-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729577" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=18-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705480" version="1" comment="cifs-utils is &lt;6.9-150100.5.18.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151261" version="1" comment="cifs-utils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717628" version="1" comment="libgpg-error0 is &lt;1.42-150300.9.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721857" version="1" comment="libgpg-error0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755119" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755215" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755384" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755120" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755216" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755217" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755121" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725519" version="1" comment="kernel-default is &lt;4.12.14-122.130.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755218" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755219" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=9-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755220" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=9-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725523" version="1" comment="kernel-default is &lt;4.12.14-150100.197.120.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755221" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755222" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725525" version="1" comment="kernel-default is &lt;5.3.18-150200.24.126.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713812" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713813" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713814" version="1" comment="kernel-livepatch-4_12_14-150000_150_89-default is &gt;=3-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713815" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=3-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713816" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=3-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713817" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=3-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742406" version="1" comment="kernel-rt is &lt;5.3.18-150300.118.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714108" version="1" comment="permissions is &lt;20181225-150200.23.15.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009273426" version="1" comment="permissions is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707853" version="1" comment="libvmtools0 is &lt;12.1.0-150300.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152857" version="1" comment="libvmtools0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707854" version="1" comment="open-vm-tools is &lt;12.1.0-150300.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152858" version="1" comment="open-vm-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699059" version="1" comment="libfreebl3 is &lt;3.79-150000.3.74.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699060" version="1" comment="libfreebl3-hmac is &lt;3.79-150000.3.74.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699061" version="1" comment="libsoftokn3 is &lt;3.79-150000.3.74.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699062" version="1" comment="libsoftokn3-hmac is &lt;3.79-150000.3.74.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699063" version="1" comment="mozilla-nspr is &lt;4.34-150000.3.23.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152084" version="1" comment="mozilla-nspr is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699065" version="1" comment="mozilla-nss is &lt;3.79-150000.3.74.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699066" version="1" comment="mozilla-nss-certs is &lt;3.79-150000.3.74.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699069" version="1" comment="mozilla-nss-tools is &lt;3.79-150000.3.74.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699138" version="1" comment="curl is &lt;7.66.0-150200.4.36.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151177" version="1" comment="curl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699140" version="1" comment="libcurl4 is &lt;7.66.0-150200.4.36.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151179" version="1" comment="libcurl4 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721618" version="1" comment="curl is &lt;7.66.0-150200.4.42.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721620" version="1" comment="libcurl4 is &lt;7.66.0-150200.4.42.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751546" version="1" comment="libldb2 is &lt;2.4.4-150300.3.23.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751559" version="1" comment="samba-client-libs is &lt;4.15.13+git.636.53d93c5b9d6-150300.3.52.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702166" version="1" comment="libharfbuzz0 is &lt;2.6.4-150200.3.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153263" version="1" comment="libharfbuzz0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724870" version="1" comment="xen-libs is &lt;4.14.5_08-150300.3.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737240" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737009" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714512" version="1" comment="kernel-default is ==4.12.14-95.108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737241" version="1" comment="kgraft-patch-4_12_14-95_108-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729505" version="1" comment="kernel-default is ==4.12.14-95.111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737242" version="1" comment="kgraft-patch-4_12_14-95_111-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737325" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737326" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737369" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737327" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737328" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737329" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737370" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737330" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737331" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737371" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737332" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715347" version="1" comment="kernel-default is ==4.12.14-122.133.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737372" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729511" version="1" comment="kernel-default is ==4.12.14-122.136.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737333" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729513" version="1" comment="kernel-default is &lt;4.12.14-122.136.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737244" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737183" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=8-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737184" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=6-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737185" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=6-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729104" version="1" comment="kernel-default is ==4.12.14-150100.197.123.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737010" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729519" version="1" comment="kernel-default is ==4.12.14-150100.197.126.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737186" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737187" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=13-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737188" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=12-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725513" version="1" comment="kernel-default is &lt;5.14.21-150400.24.28.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705485" version="1" comment="gpg2 is &lt;2.2.27-150300.3.5.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151446" version="1" comment="gpg2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729554" version="1" comment="vim-data-common is &lt;9.0.1040-150000.5.31.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729641" version="1" comment="vim-small is &lt;9.0.1040-150000.5.31.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718554" version="1" comment="libksba8 is &lt;1.3.5-150000.4.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152539" version="1" comment="libksba8 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708371" version="1" comment="curl is &lt;7.66.0-150200.4.39.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708372" version="1" comment="libcurl4 is &lt;7.66.0-150200.4.39.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717329" version="1" comment="qemu is &lt;5.2.0-150300.118.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717046" version="1" comment="qemu-arm is &lt;5.2.0-150300.118.3 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717330" version="1" comment="qemu-audio-spice is &lt;5.2.0-150300.118.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717331" version="1" comment="qemu-chardev-spice is &lt;5.2.0-150300.118.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717332" version="1" comment="qemu-guest-agent is &lt;5.2.0-150300.118.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717333" version="1" comment="qemu-hw-display-qxl is &lt;5.2.0-150300.118.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717334" version="1" comment="qemu-hw-display-virtio-gpu is &lt;5.2.0-150300.118.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717335" version="1" comment="qemu-hw-display-virtio-vga is &lt;5.2.0-150300.118.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717336" version="1" comment="qemu-hw-usb-redirect is &lt;5.2.0-150300.118.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717063" version="1" comment="qemu-ipxe is &lt;1.0.0+-150300.118.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717069" version="1" comment="qemu-seabios is &lt;1.14.0_0_g155821a-150300.118.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717070" version="1" comment="qemu-sgabios is &lt;8-150300.118.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717337" version="1" comment="qemu-tools is &lt;5.2.0-150300.118.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717338" version="1" comment="qemu-ui-opengl is &lt;5.2.0-150300.118.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717339" version="1" comment="qemu-ui-spice-core is &lt;5.2.0-150300.118.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717077" version="1" comment="qemu-vgabios is &lt;1.14.0_0_g155821a-150300.118.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717078" version="1" comment="qemu-x86 is &lt;5.2.0-150300.118.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729502" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729503" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729504" version="1" comment="kgraft-patch-4_12_14-95_108-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729506" version="1" comment="kgraft-patch-4_12_14-95_111-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729578" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729097" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729579" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729507" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729508" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729509" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729098" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729510" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729512" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729099" version="1" comment="kernel-default is ==4.12.14-150000.150.101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729100" version="1" comment="kernel-livepatch-4_12_14-150000_150_101-default is &gt;=2-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729514" version="1" comment="kernel-default is ==4.12.14-150000.150.104.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729515" version="1" comment="kernel-livepatch-4_12_14-150000_150_104-default is &gt;=2-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729580" version="1" comment="kernel-livepatch-4_12_14-150000_150_89-default is &gt;=10-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729581" version="1" comment="kernel-livepatch-4_12_14-150000_150_92-default is &gt;=7-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729582" version="1" comment="kernel-livepatch-4_12_14-150000_150_95-default is &gt;=5-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729583" version="1" comment="kernel-livepatch-4_12_14-150000_150_98-default is &gt;=5-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729517" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=10-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729102" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=7-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729103" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=5-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729518" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=5-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729105" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729520" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729775" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729107" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729108" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729521" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729109" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729584" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729585" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729522" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729586" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729523" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729524" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729111" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729112" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729587" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=9-150400.4.24.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729114" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729115" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729588" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729589" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721860" version="1" comment="libX11-6 is &lt;1.6.5-150000.3.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151817" version="1" comment="libX11-6 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721528" version="1" comment="libX11-data is &lt;1.6.5-150000.3.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151819" version="1" comment="libX11-data is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721861" version="1" comment="libX11-xcb1 is &lt;1.6.5-150000.3.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151821" version="1" comment="libX11-xcb1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743227" version="1" comment="libX11-6 is &lt;1.6.5-150000.3.27.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743063" version="1" comment="libX11-data is &lt;1.6.5-150000.3.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743228" version="1" comment="libX11-xcb1 is &lt;1.6.5-150000.3.27.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742686" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742526" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742527" version="1" comment="kgraft-patch-4_12_14-95_108-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742528" version="1" comment="kgraft-patch-4_12_14-95_111-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742251" version="1" comment="kernel-default is ==4.12.14-95.114.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742252" version="1" comment="kgraft-patch-4_12_14-95_114-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742529" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742687" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742530" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742531" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742688" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742689" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742532" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742533" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742534" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742690" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742535" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729116" version="1" comment="kernel-default is ==4.12.14-122.139.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742254" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742255" version="1" comment="kernel-default is ==4.12.14-122.144.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742256" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742257" version="1" comment="kernel-default is &lt;4.12.14-122.144.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742536" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=12-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742537" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=9-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742538" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=7-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742539" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=7-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742540" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742541" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742258" version="1" comment="kernel-default is ==4.12.14-150100.197.131.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742259" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742542" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=13-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742691" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742543" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742544" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742545" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742546" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742261" version="1" comment="kernel-default is ==5.3.18-150200.24.139.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742262" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742547" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737237" version="1" comment="kernel-default is &lt;5.3.18-24.107.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742264" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742548" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742549" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742692" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742693" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742550" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742694" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742695" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742696" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742697" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742698" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743615" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=11-150400.7.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743616" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743617" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743618" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743619" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727260" version="1" comment="libtiff5 is &lt;4.0.9-150000.45.22.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725556" version="1" comment="libtiff5 is &lt;4.0.9-150000.45.19.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009739408" version="1" comment="kernel-default is &lt;5.3.18-150300.59.112.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009739409" version="1" comment="kernel-default-base is &lt;5.3.18-150300.59.112.1.150300.18.64.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009745026" version="1" comment="kernel-rt is &lt;5.3.18-150300.121.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743848" version="1" comment="docker is &lt;20.10.23_ce-150000.175.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152505" version="1" comment="docker is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744746" version="1" comment="kernel-default is &lt;5.3.18-150300.59.115.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744747" version="1" comment="kernel-default-base is &lt;5.3.18-150300.59.115.2.150300.18.66.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706291" version="1" comment="libz1 is &lt;1.2.11-150000.3.33.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153971" version="1" comment="libz1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729960" version="1" comment="samba-client-libs is &lt;4.15.13+git.540.fab3b2a46c6-150300.3.46.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723306" version="1" comment="libsystemd0 is &lt;246.16-150300.7.54.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154102" version="1" comment="libsystemd0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723307" version="1" comment="libudev1 is &lt;246.16-150300.7.54.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151691" version="1" comment="libudev1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723308" version="1" comment="systemd is &lt;246.16-150300.7.54.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151693" version="1" comment="systemd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723309" version="1" comment="systemd-container is &lt;246.16-150300.7.54.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239132" version="1" comment="systemd-container is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723310" version="1" comment="systemd-journal-remote is &lt;246.16-150300.7.54.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625973" version="1" comment="systemd-journal-remote is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723311" version="1" comment="systemd-sysvinit is &lt;246.16-150300.7.54.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151697" version="1" comment="systemd-sysvinit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723312" version="1" comment="udev is &lt;246.16-150300.7.54.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151699" version="1" comment="udev is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715346" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714511" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714513" version="1" comment="kgraft-patch-4_12_14-95_108-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714514" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715348" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714515" version="1" comment="kernel-livepatch-4_12_14-150000_150_92-default is &gt;=5-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715618" version="1" comment="kernel-livepatch-4_12_14-150000_150_95-default is &gt;=3-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714516" version="1" comment="kernel-livepatch-4_12_14-150000_150_98-default is &gt;=3-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715619" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=3-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718699" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=9-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718700" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718701" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718702" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=14-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718703" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718704" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=18-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718705" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718706" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718707" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=15-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718708" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718709" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718710" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718860" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718711" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718712" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718713" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718714" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718715" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718716" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718717" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718368" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718718" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=18-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718719" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718720" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718721" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718722" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=7-150400.4.18.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718723" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718370" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718371" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715602" version="1" comment="kernel-default is &lt;5.14.21-150400.24.21.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715847" version="1" comment="libexpat1 is &lt;2.2.5-150000.3.22.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151332" version="1" comment="libexpat1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009731781" version="1" comment="python3-setuptools is &lt;40.5.0-150100.6.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009303048" version="1" comment="python3-setuptools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009731088" version="1" comment="python3-future is &lt;0.18.2-150300.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009732024" version="1" comment="python3-future is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729591" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009720775" version="1" comment="kpartx is &lt;0.8.5+126+suse.8ce8da5-150300.2.14.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009720096" version="1" comment="kpartx is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009720776" version="1" comment="libmpath0 is &lt;0.8.5+126+suse.8ce8da5-150300.2.14.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009720099" version="1" comment="libmpath0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009720777" version="1" comment="multipath-tools is &lt;0.8.5+126+suse.8ce8da5-150300.2.14.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009720100" version="1" comment="multipath-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717556" version="1" comment="dbus-1 is &lt;1.12.2-150100.8.14.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151535" version="1" comment="dbus-1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717558" version="1" comment="dbus-1-x11 is &lt;1.12.2-150100.8.14.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151537" version="1" comment="dbus-1-x11 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717559" version="1" comment="libdbus-1-3 is &lt;1.12.2-150100.8.14.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151538" version="1" comment="libdbus-1-3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009747859" version="1" comment="xen-libs is &lt;4.14.5_12-150300.3.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009735623" version="1" comment="libsss_certmap0 is &lt;1.16.1-150300.23.37.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231790" version="1" comment="libsss_certmap0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009735625" version="1" comment="libsss_idmap0 is &lt;1.16.1-150300.23.37.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151530" version="1" comment="libsss_idmap0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009735627" version="1" comment="libsss_nss_idmap0 is &lt;1.16.1-150300.23.37.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152072" version="1" comment="libsss_nss_idmap0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009735631" version="1" comment="sssd is &lt;1.16.1-150300.23.37.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151531" version="1" comment="sssd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009735633" version="1" comment="sssd-common is &lt;1.16.1-150300.23.37.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632505" version="1" comment="sssd-common is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009735638" version="1" comment="sssd-krb5-common is &lt;1.16.1-150300.23.37.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151533" version="1" comment="sssd-krb5-common is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009735639" version="1" comment="sssd-ldap is &lt;1.16.1-150300.23.37.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151534" version="1" comment="sssd-ldap is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725528" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725256" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009734521" version="1" comment="krb5 is &lt;1.19.2-150300.10.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151005" version="1" comment="krb5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009732670" version="1" comment="python3-py is &lt;1.10.0-150100.5.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009477849" version="1" comment="python3-py is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737673" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1d-150200.11.57.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737675" version="1" comment="libopenssl1_1 is &lt;1.1.1d-150200.11.57.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737677" version="1" comment="libopenssl1_1-hmac is &lt;1.1.1d-150200.11.57.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737679" version="1" comment="openssl-1_1 is &lt;1.1.1d-150200.11.57.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729985" version="1" comment="curl is &lt;7.66.0-150200.4.45.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729986" version="1" comment="libcurl4 is &lt;7.66.0-150200.4.45.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721903" version="1" comment="libexpat1 is &lt;2.2.5-150000.3.25.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729117" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711321" version="1" comment="kernel-default is ==" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009738273" version="1" comment="kernel-livepatch-5_14_21-150400_15_5-rt is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737373" version="1" comment="kernel-default is ==5.14.21-150400.24.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737374" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711367" version="1" comment="kernel-default is &lt;" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725788" version="1" comment="sudo is &lt;1.9.5p2-150300.3.13.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151407" version="1" comment="sudo is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730368" version="1" comment="libsystemd0 is &lt;246.16-150300.7.57.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730370" version="1" comment="libudev1 is &lt;246.16-150300.7.57.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730371" version="1" comment="systemd is &lt;246.16-150300.7.57.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730372" version="1" comment="systemd-container is &lt;246.16-150300.7.57.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730376" version="1" comment="systemd-journal-remote is &lt;246.16-150300.7.57.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730377" version="1" comment="systemd-sysvinit is &lt;246.16-150300.7.57.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730378" version="1" comment="udev is &lt;246.16-150300.7.57.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724965" version="1" comment="libpixman-1-0 is &lt;0.34.0-150000.7.5.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726389" version="1" comment="libpixman-1-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742213" version="1" comment="libpython3_6m1_0 is &lt;3.6.15-150300.10.40.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742214" version="1" comment="python3 is &lt;3.6.15-150300.10.40.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742215" version="1" comment="python3-base is &lt;3.6.15-150300.10.40.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729752" version="1" comment="libsqlite3-0 is &lt;3.39.3-150000.3.20.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769980" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769981" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=9-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769982" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=9-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770206" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=6-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751206" version="1" comment="kernel-default is ==5.3.18-150200.24.142.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769983" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=5-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751208" version="1" comment="kernel-default is ==5.3.18-150200.24.145.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769984" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751210" version="1" comment="kernel-default is &lt;5.3.18-150200.24.145.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770207" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742266" version="1" comment="kernel-default is ==5.3.18-150300.59.106.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770208" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742711" version="1" comment="kernel-default is ==5.3.18-150300.59.109.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770209" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751212" version="1" comment="kernel-default is ==5.3.18-150300.59.112.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770210" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=5-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751214" version="1" comment="kernel-default is ==5.3.18-150300.59.115.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769985" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770211" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770251" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770212" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770213" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770214" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770252" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=12-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770215" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=12-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730954" version="1" comment="libksba8 is &lt;1.3.5-150000.4.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009735647" version="1" comment="libtiff5 is &lt;4.0.9-150000.45.25.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009740152" version="1" comment="tar is &lt;1.34-150000.3.31.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151391" version="1" comment="tar is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009748403" version="1" comment="libzstd1 is &lt;1.4.4-150000.1.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262525" version="1" comment="libzstd1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009748404" version="1" comment="zstd is &lt;1.4.4-150000.1.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262526" version="1" comment="zstd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009739388" version="1" comment="libcares2 is &lt;1.19.0-150000.3.20.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153706" version="1" comment="libcares2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009735253" version="1" comment="vim-data-common is &lt;9.0.1234-150000.5.34.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009736710" version="1" comment="vim-small is &lt;9.0.1234-150000.5.34.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742267" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742712" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743620" version="1" comment="kernel-livepatch-5_14_21-150400_15_5-rt is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743621" version="1" comment="kernel-livepatch-5_14_21-150400_15_8-rt is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743622" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743623" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743624" version="1" comment="kernel-default is ==5.14.21-150400.24.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743625" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751177" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=13-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751178" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=11-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751179" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=10-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751180" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=8-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751181" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=8-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751182" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=6-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751183" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=5-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751184" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751185" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=3-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751186" version="1" comment="kernel-default is ==4.12.14-122.147.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751187" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=2-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751188" version="1" comment="kernel-default is &lt;4.12.14-122.147.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750757" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=14-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750758" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=12-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750759" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=9-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750760" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=6-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751189" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=6-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751190" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=3-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742263" version="1" comment="kernel-default is &lt;5.3.18-150200.24.139.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750762" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=5-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750763" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=3-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751191" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=17-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751192" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=14-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751193" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=13-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751194" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=12-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751195" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=11-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751196" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=10-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751197" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=9-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750764" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=8-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751198" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=6-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750643" version="1" comment="kernel-livepatch-5_14_21-150400_15_5-rt is &gt;=4-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751199" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=12-150400.10.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751200" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=9-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751201" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=9-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751202" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=8-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751203" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=6-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751204" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=5-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751205" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=4-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009752332" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=3-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009740806" version="1" comment="gnutls is &lt;3.6.7-150200.14.25.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009740807" version="1" comment="libgnutls30 is &lt;3.6.7-150200.14.25.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009740808" version="1" comment="libgnutls30-hmac is &lt;3.6.7-150200.14.25.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764659" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=4-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764660" version="1" comment="kernel-livepatch-5_14_21-150400_15_18-rt is &gt;=3-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764661" version="1" comment="kernel-livepatch-5_14_21-150400_15_23-rt is &gt;=2-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764662" version="1" comment="kernel-livepatch-5_14_21-150400_15_5-rt is &gt;=6-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764663" version="1" comment="kernel-livepatch-5_14_21-150400_15_8-rt is &gt;=5-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765065" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=14-150400.16.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764664" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=11-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764665" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=11-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764666" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=10-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764667" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=8-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764668" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=7-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764669" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=6-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764670" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=5-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751216" version="1" comment="kernel-default is ==5.14.21-150400.24.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764671" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=4-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755396" version="1" comment="kernel-default is ==5.14.21-150400.24.55.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764672" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=3-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764673" version="1" comment="kernel-default is ==5.14.21-150400.24.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764674" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=2-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764675" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=14-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764676" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=11-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764677" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=8-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764678" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=8-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764679" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=5-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764680" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=4-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764681" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=3-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764682" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=7-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764683" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=5-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764684" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=5-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764685" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=4-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764686" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=3-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764687" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=14-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764688" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=13-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764689" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764690" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=11-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764691" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=10-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764692" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=8-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009752983" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1d-150200.11.62.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009752985" version="1" comment="libopenssl1_1 is &lt;1.1.1d-150200.11.62.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009752987" version="1" comment="libopenssl1_1-hmac is &lt;1.1.1d-150200.11.62.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009752989" version="1" comment="openssl-1_1 is &lt;1.1.1d-150200.11.62.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743831" version="1" comment="vim-data-common is &lt;9.0.1386-150000.5.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743853" version="1" comment="vim-small is &lt;9.0.1386-150000.5.37.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755385" version="1" comment="kgraft-patch-4_12_14-95_108-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755386" version="1" comment="kgraft-patch-4_12_14-95_111-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755223" version="1" comment="kgraft-patch-4_12_14-95_114-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751223" version="1" comment="kernel-default is ==4.12.14-95.117.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755387" version="1" comment="kgraft-patch-4_12_14-95_117-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755224" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755225" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755226" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755227" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755228" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755229" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=6-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755230" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=6-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755231" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=4-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751233" version="1" comment="kernel-default is ==4.12.14-150100.197.134.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755232" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=3-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751235" version="1" comment="kernel-default is &lt;4.12.14-150100.197.134.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755233" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=7-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755234" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=7-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755235" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=4-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755236" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=3-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751236" version="1" comment="kernel-default is &lt;5.3.18-150200.24.142.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755237" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755238" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=4-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755388" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=4-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755389" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=3-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755239" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755240" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755241" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755242" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755243" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755244" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755245" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755246" version="1" comment="kernel-livepatch-5_14_21-150400_15_5-rt is &gt;=5-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755247" version="1" comment="kernel-livepatch-5_14_21-150400_15_8-rt is &gt;=4-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755390" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=13-150400.13.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755391" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=10-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755392" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=10-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755248" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=9-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755393" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=7-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755394" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=6-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755249" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=5-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755395" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=4-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743626" version="1" comment="glibc is &lt;2.31-150300.46.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151368" version="1" comment="glibc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743630" version="1" comment="glibc-locale is &lt;2.31-150300.46.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151373" version="1" comment="glibc-locale is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743631" version="1" comment="glibc-locale-base is &lt;2.31-150300.46.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251612" version="1" comment="glibc-locale-base is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009739389" version="1" comment="libfreebl3 is &lt;3.79.4-150000.3.93.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009739391" version="1" comment="libfreebl3-hmac is &lt;3.79.4-150000.3.93.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009739393" version="1" comment="libsoftokn3 is &lt;3.79.4-150000.3.93.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009739395" version="1" comment="libsoftokn3-hmac is &lt;3.79.4-150000.3.93.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009739397" version="1" comment="mozilla-nss is &lt;3.79.4-150000.3.93.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009739399" version="1" comment="mozilla-nss-certs is &lt;3.79.4-150000.3.93.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009739404" version="1" comment="mozilla-nss-tools is &lt;3.79.4-150000.3.93.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009752711" version="1" comment="podman is &lt;4.4.4-150300.9.20.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009752712" version="1" comment="podman-cni-config is &lt;4.4.4-150300.9.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755648" version="1" comment="libtpms0 is &lt;0.8.2-150300.3.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009786219" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009786220" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794740" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795130" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795131" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795992" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751227" version="1" comment="kernel-default is ==4.12.14-122.150.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009786221" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764702" version="1" comment="kernel-default is ==4.12.14-122.153.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009786222" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764728" version="1" comment="kernel-default is ==4.12.14-122.156.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009786223" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770229" version="1" comment="kernel-default is ==4.12.14-122.159.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795132" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776021" version="1" comment="kernel-default is ==4.12.14-122.162.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009786224" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776023" version="1" comment="kernel-default is &lt;4.12.14-122.162.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795133" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=13-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782315" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=10-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782316" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=10-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794741" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=8-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795134" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=7-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764712" version="1" comment="kernel-default is ==4.12.14-150100.197.137.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782317" version="1" comment="kernel-livepatch-4_12_14-150100_197_137-default is &gt;=5-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764731" version="1" comment="kernel-default is ==4.12.14-150100.197.142.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782318" version="1" comment="kernel-livepatch-4_12_14-150100_197_142-default is &gt;=5-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764734" version="1" comment="kernel-default is ==4.12.14-150100.197.145.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782319" version="1" comment="kernel-livepatch-4_12_14-150100_197_145-default is &gt;=5-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764736" version="1" comment="kernel-default is &lt;4.12.14-150100.197.145.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795742" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=14-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795743" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795744" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795745" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=8-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795746" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=7-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795747" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764715" version="1" comment="kernel-default is ==5.3.18-150200.24.148.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795748" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764737" version="1" comment="kernel-default is ==5.3.18-150200.24.151.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795749" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776028" version="1" comment="kernel-default is ==5.3.18-150200.24.154.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795750" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776030" version="1" comment="kernel-default is &lt;5.3.18-150200.24.154.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795751" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794742" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795752" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795753" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795824" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764718" version="1" comment="kernel-default is ==5.3.18-150300.59.118.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795993" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764740" version="1" comment="kernel-default is ==5.3.18-150300.59.121.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795825" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775813" version="1" comment="kernel-default is ==5.3.18-150300.59.124.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795994" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795135" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794743" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795136" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796654" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=7-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796655" version="1" comment="kernel-livepatch-5_14_21-150400_15_18-rt is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796656" version="1" comment="kernel-livepatch-5_14_21-150400_15_23-rt is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796657" version="1" comment="kernel-livepatch-5_14_21-150400_15_28-rt is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796658" version="1" comment="kernel-livepatch-5_14_21-150400_15_5-rt is &gt;=9-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796659" version="1" comment="kernel-livepatch-5_14_21-150400_15_8-rt is &gt;=8-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795995" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=14-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795996" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=13-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795997" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=11-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795998" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=10-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795999" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=9-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796000" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=8-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796001" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=7-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796002" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796003" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764743" version="1" comment="kernel-default is ==5.14.21-150400.24.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796004" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776036" version="1" comment="kernel-default is ==5.14.21-150400.24.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796005" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796660" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=3-150500.6.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776034" version="1" comment="kernel-default is ==5.14.21-150500.53.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796007" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=3-150500.6.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751207" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=2-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751209" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=2-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751211" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=3-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751213" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=2-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751215" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=2-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750644" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=2-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750645" version="1" comment="kernel-livepatch-5_14_21-150400_15_8-rt is &gt;=3-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751217" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=2-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755122" version="1" comment="kernel-default is ==4.12.14-95.120.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755123" version="1" comment="kgraft-patch-4_12_14-95_120-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755250" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751229" version="1" comment="kernel-default is &lt;4.12.14-122.150.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755251" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=3-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755642" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=3-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755947" version="1" comment="vim-data-common is &lt;9.0.1443-150000.5.40.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009756067" version="1" comment="vim-small is &lt;9.0.1443-150000.5.40.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755949" version="1" comment="xxd is &lt;9.0.1443-150000.5.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009756472" version="1" comment="xxd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764693" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764694" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764695" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764696" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764697" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764698" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764699" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764700" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764701" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764703" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764704" version="1" comment="kernel-default is &lt;4.12.14-122.153.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764705" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=12-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764706" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=10-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764707" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=10-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764708" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=7-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764709" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=7-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764710" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=5-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764711" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=4-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764713" version="1" comment="kernel-livepatch-4_12_14-150100_197_137-default is &gt;=2-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764714" version="1" comment="kernel-default is &lt;4.12.14-150100.197.137.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769736" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=11-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769737" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769987" version="1" comment="kgraft-patch-4_12_14-95_108-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770216" version="1" comment="kgraft-patch-4_12_14-95_111-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769988" version="1" comment="kgraft-patch-4_12_14-95_114-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769989" version="1" comment="kgraft-patch-4_12_14-95_117-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769738" version="1" comment="kgraft-patch-4_12_14-95_120-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755124" version="1" comment="kernel-default is &lt;4.12.14-95.120.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770217" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770218" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770219" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769990" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769991" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769992" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770220" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770221" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769993" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770222" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769994" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770223" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=8-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769995" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=8-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769996" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=6-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769997" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=5-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769998" version="1" comment="kernel-livepatch-4_12_14-150100_197_137-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755252" version="1" comment="kernel-livepatch-5_14_21-150400_15_18-rt is &gt;=2-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755397" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=2-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798679" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798650" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798651" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798680" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798681" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798652" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798653" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798682" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798654" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798655" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794744" version="1" comment="kernel-default is ==4.12.14-122.165.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798683" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798684" version="1" comment="kernel-default is ==4.12.14-122.173.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798685" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798686" version="1" comment="kernel-default is &lt;4.12.14-122.173.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798903" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798687" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798904" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=9-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798905" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=8-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798906" version="1" comment="kernel-livepatch-4_12_14-150100_197_137-default is &gt;=6-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798907" version="1" comment="kernel-livepatch-4_12_14-150100_197_142-default is &gt;=6-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799060" version="1" comment="kernel-livepatch-4_12_14-150100_197_145-default is &gt;=6-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775802" version="1" comment="kernel-default is ==4.12.14-150100.197.148.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799061" version="1" comment="kernel-livepatch-4_12_14-150100_197_148-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782321" version="1" comment="kernel-default is ==4.12.14-150100.197.151.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799062" version="1" comment="kernel-livepatch-4_12_14-150100_197_151-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799063" version="1" comment="kernel-default is ==4.12.14-150100.197.154.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799064" version="1" comment="kernel-livepatch-4_12_14-150100_197_154-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799065" version="1" comment="kernel-default is &lt;4.12.14-150100.197.154.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799066" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798908" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799067" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=8-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799068" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799069" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799070" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764739" version="1" comment="kernel-default is &lt;5.3.18-150200.24.151.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798909" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=8-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798910" version="1" comment="kernel-livepatch-5_14_21-150400_15_18-rt is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798911" version="1" comment="kernel-livepatch-5_14_21-150400_15_23-rt is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798912" version="1" comment="kernel-livepatch-5_14_21-150400_15_28-rt is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798913" version="1" comment="kernel-livepatch-5_14_21-150400_15_37-rt is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798914" version="1" comment="kernel-livepatch-5_14_21-150400_15_5-rt is &gt;=10-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798915" version="1" comment="kernel-livepatch-5_14_21-150400_15_8-rt is &gt;=9-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798916" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=4-150500.9.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798917" version="1" comment="kernel-livepatch-5_14_21-150500_13_5-rt is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764716" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=2-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764717" version="1" comment="kernel-default is &lt;5.3.18-150200.24.148.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764719" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=2-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009754604" version="1" comment="avahi is &lt;0.7-150100.3.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151208" version="1" comment="avahi is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009754605" version="1" comment="libavahi-client3 is &lt;0.7-150100.3.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151212" version="1" comment="libavahi-client3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009754606" version="1" comment="libavahi-common3 is &lt;0.7-150100.3.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151214" version="1" comment="libavahi-common3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009754607" version="1" comment="libavahi-core7 is &lt;0.7-150100.3.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151216" version="1" comment="libavahi-core7 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764720" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764721" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764722" version="1" comment="kgraft-patch-4_12_14-95_108-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764723" version="1" comment="kgraft-patch-4_12_14-95_111-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764724" version="1" comment="kgraft-patch-4_12_14-95_114-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764725" version="1" comment="kgraft-patch-4_12_14-95_117-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764726" version="1" comment="kgraft-patch-4_12_14-95_120-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764727" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764729" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764730" version="1" comment="kernel-default is &lt;4.12.14-122.156.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764732" version="1" comment="kernel-livepatch-4_12_14-150100_197_142-default is &gt;=2-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764733" version="1" comment="kernel-default is &lt;4.12.14-150100.197.142.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776019" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=12-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775786" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=10-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775787" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=9-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775788" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=8-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775789" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=7-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775790" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=6-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775791" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=6-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775792" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775793" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776020" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776022" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775794" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=12-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775795" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=9-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775796" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=9-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775797" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=7-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775798" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=6-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775799" version="1" comment="kernel-livepatch-4_12_14-150100_197_137-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775800" version="1" comment="kernel-livepatch-4_12_14-150100_197_142-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775801" version="1" comment="kernel-livepatch-4_12_14-150100_197_145-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775803" version="1" comment="kernel-livepatch-4_12_14-150100_197_148-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775804" version="1" comment="kernel-default is &lt;4.12.14-150100.197.148.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775805" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776024" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775806" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776025" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=7-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775807" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=6-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776026" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776027" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775808" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776029" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776031" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776032" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775809" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776033" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775810" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775811" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775812" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775814" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775815" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775816" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775817" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775818" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=6-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775819" version="1" comment="kernel-livepatch-5_14_21-150400_15_18-rt is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775820" version="1" comment="kernel-livepatch-5_14_21-150400_15_23-rt is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775821" version="1" comment="kernel-livepatch-5_14_21-150400_15_5-rt is &gt;=8-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775822" version="1" comment="kernel-livepatch-5_14_21-150400_15_8-rt is &gt;=7-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775823" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=13-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775824" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=12-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775825" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=10-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775826" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=9-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775827" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=8-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775828" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=7-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775829" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=6-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775830" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775831" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776228" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=2-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776035" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=2-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796008" version="1" comment="kernel-default is ==5.3.18-150300.59.127.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796009" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796661" version="1" comment="kernel-livepatch-5_14_21-150400_15_37-rt is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796662" version="1" comment="kernel-livepatch-5_14_21-150400_15_40-rt is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796010" version="1" comment="kernel-default is ==5.14.21-150400.24.69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796011" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796012" version="1" comment="kernel-default is ==5.14.21-150400.24.74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796013" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796663" version="1" comment="kernel-livepatch-5_14_21-150500_13_5-rt is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796015" version="1" comment="kernel-default is ==5.14.21-150500.55.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796016" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796017" version="1" comment="kernel-default is ==5.14.21-150500.55.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796018" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770231" version="1" comment="kernel-default is &lt;4.12.14-122.159.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009733701" version="1" comment="sudo is &lt;1.9.5p2-150300.3.19.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764735" version="1" comment="kernel-livepatch-4_12_14-150100_197_145-default is &gt;=2-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764738" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=2-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764741" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=2-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764742" version="1" comment="kernel-livepatch-5_14_21-150400_15_28-rt is &gt;=2-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764744" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=2-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742253" version="1" comment="kernel-default is &lt;4.12.14-95.114.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742260" version="1" comment="kernel-default is &lt;4.12.14-150100.197.131.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769999" version="1" comment="kernel-livepatch-5_14_21-150400_15_5-rt is &gt;=7-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770000" version="1" comment="kernel-livepatch-5_14_21-150400_15_8-rt is &gt;=6-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770224" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=11-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770225" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=9-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770226" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=8-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770253" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=7-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770227" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=6-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009748284" version="1" comment="curl is &lt;7.66.0-150200.4.52.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009748285" version="1" comment="libcurl4 is &lt;7.66.0-150200.4.52.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743778" version="1" comment="python3-cryptography is &lt;3.3.2-150200.19.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009747016" version="1" comment="libpython3_6m1_0 is &lt;3.6.15-150300.10.45.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009747017" version="1" comment="python3 is &lt;3.6.15-150300.10.45.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009747018" version="1" comment="python3-base is &lt;3.6.15-150300.10.45.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755563" version="1" comment="glib2-tools is &lt;2.62.6-150200.3.15.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755564" version="1" comment="libgio-2_0-0 is &lt;2.62.6-150200.3.15.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755565" version="1" comment="libglib-2_0-0 is &lt;2.62.6-150200.3.15.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755566" version="1" comment="libgmodule-2_0-0 is &lt;2.62.6-150200.3.15.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755567" version="1" comment="libgobject-2_0-0 is &lt;2.62.6-150200.3.15.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009752241" version="1" comment="containerd is &lt;1.6.19-150000.87.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009753275" version="1" comment="libharfbuzz0 is &lt;2.6.4-150200.3.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009752713" version="1" comment="runc is &lt;1.1.5-150000.41.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153867" version="1" comment="runc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751218" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=8-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751219" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=8-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751220" version="1" comment="kgraft-patch-4_12_14-95_108-default is &gt;=6-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751221" version="1" comment="kgraft-patch-4_12_14-95_111-default is &gt;=5-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751222" version="1" comment="kgraft-patch-4_12_14-95_114-default is &gt;=3-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751224" version="1" comment="kgraft-patch-4_12_14-95_117-default is &gt;=2-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751225" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=13-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751226" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=10-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751228" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=2-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750765" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=13-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750766" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=10-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751230" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=8-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750767" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=8-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750768" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=5-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751231" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=5-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751232" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=3-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751234" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=2-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742932" version="1" comment="libmicrohttpd12 is &lt;0.9.57-150000.3.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751539" version="1" comment="libmicrohttpd12 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009752242" version="1" comment="dnsmasq is &lt;2.86-150100.7.23.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152784" version="1" comment="dnsmasq is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770228" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770230" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770001" version="1" comment="kernel-livepatch-4_12_14-150100_197_142-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770002" version="1" comment="kernel-livepatch-4_12_14-150100_197_145-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770003" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=5-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770004" version="1" comment="kernel-livepatch-5_14_21-150400_15_18-rt is &gt;=4-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770232" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=5-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770233" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=4-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750787" version="1" comment="sudo is &lt;1.9.5p2-150300.3.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009754854" version="1" comment="login_defs is &lt;4.8.1-150300.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670997" version="1" comment="login_defs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009754855" version="1" comment="shadow is &lt;4.8.1-150300.4.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166874" version="1" comment="shadow is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009754961" version="1" comment="dmidecode is &lt;3.2-150100.9.16.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755043" version="1" comment="dmidecode is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782320" version="1" comment="kernel-livepatch-4_12_14-150100_197_148-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798920" version="1" comment="kernel-livepatch-5_14_21-150400_15_40-rt is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770234" version="1" comment="kernel-default is ==4.12.14-95.125.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770235" version="1" comment="kgraft-patch-4_12_14-95_125-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770236" version="1" comment="kernel-default is &lt;4.12.14-95.125.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770005" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770237" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770238" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770239" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770006" version="1" comment="kernel-livepatch-5_14_21-150400_15_23-rt is &gt;=3-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770007" version="1" comment="kernel-livepatch-5_14_21-150400_15_28-rt is &gt;=3-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770240" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=3-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770241" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=3-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794745" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794746" version="1" comment="kernel-default is &lt;4.12.14-122.165.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782322" version="1" comment="kernel-livepatch-4_12_14-150100_197_151-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782323" version="1" comment="kernel-default is &lt;4.12.14-150100.197.151.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795754" version="1" comment="kernel-default is ==5.3.18-150200.24.157.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795755" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795756" version="1" comment="kernel-default is &lt;5.3.18-150200.24.157.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775832" version="1" comment="kernel-livepatch-5_14_21-150400_15_28-rt is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775833" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776037" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799074" version="1" comment="kernel-livepatch-5_14_21-150400_15_46-rt is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799075" version="1" comment="kernel-livepatch-5_14_21-150500_13_11-rt is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
</tests>
<objects>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_38-44-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_39-47-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_43-52_6-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_44-52_10-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_44-52_18-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_48-52_27-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_49-11-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_51-52_31-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_51-52_34-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_51-52_39-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_51-60_20-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_51-60_25-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_53-60_30-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_57-60_35-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_59-60_41-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_59-60_45-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_32-33-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_36-38-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython3_6m1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openSUSE-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_21-69-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_21-81-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_21-84-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_21-90-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_38-93-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-libxml2-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_62-60_62-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_62-60_64_8-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_67-60_64_18-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_67-60_64_21-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_103-6_33-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_103-6_38-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_82-6_3-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_82-6_6-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_82-6_9-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_92-6_18-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_92-6_30-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_49-92_11-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_49-92_14-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_59-92_17-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_59-92_20-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_59-92_24-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_74-92_29-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_74-92_32-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_74-92_35-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_74-92_38-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_90-92_45-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_40-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-120-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_7-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_41-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_26-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_114-94_11-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_114-94_14-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_103-92_53-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_103-92_56-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_90-92_50-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-23-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-25_3-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_67-60_64_24-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_69-60_64_29-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_69-60_64_32-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_69-60_64_35-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_73-5-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dwarves</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>elfutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdw1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdwarves-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdwarves1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebl-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libelf1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_120-94_17-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_126-94_22-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_19-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_24-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_29-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_32-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_37-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_45-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_48-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_51-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_12-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_17-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_20-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_22-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_27-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_32-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_35-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_38-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_47-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-195-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_10-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_15-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_18-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_21-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_29-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_34-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_37-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_4-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_40-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_7-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_131-94_29-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_132-94_33-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-25_13-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-25_6-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_138-94_39-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_140-94_42-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_143-94_47-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-cryptography</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-25_16-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_155-94_50-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_156-94_57-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_156-94_61-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_156-94_64-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-25_19-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-94_41-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_3-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_6-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-25_28-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_162-94_69-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_162-94_72-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-25_22-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-25_25-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_68-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_71-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_74-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_77-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_80-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_83-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_66-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_69-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_72-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_75-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_78-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_13-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_16-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_14-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_17-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ovmf-x86_64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-uefi-aarch64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_175-94_79-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_176-94_88-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_178-94_91-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_180-94_97-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libonig4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_54-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_52-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre2-8-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>db48-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdb-4_8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_57-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_60-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_55-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_58-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_63-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_65-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_23-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_26-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_29-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_32-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_37-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_41-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_46-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_51-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_54-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_45-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_48-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_51-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_56-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_61-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_64-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_67-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_72-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_75-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-22-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_12-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_15-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_9-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_24-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_29-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_34-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_37-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_43-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu73_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu73_2-bedata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu73_2-ledata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-arm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-audio-spice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-chardev-spice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-guest-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-hw-display-qxl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-hw-display-virtio-gpu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-hw-display-virtio-vga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-hw-usb-redirect</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ipxe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-seabios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-sgabios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ui-opengl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ui-spice-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-vgabios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-suse65_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu65_1-ledata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-M2Crypto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-rsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_60-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_63-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_83-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_86-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_49-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_52-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-57-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_57-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_78-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slirp4netns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libp11-kit0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>p11-kit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>p11-kit-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_46-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_66-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_53_4-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_71-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_74-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_77-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_89-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_92-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_61-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_64-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_67-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_102-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_105-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_88-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_93-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_96-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_99-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_103-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_106-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_110-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_113-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_116-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_121-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_124-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_127-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_130-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_88-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_91-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_98-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150000_150_89-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150000_150_92-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150000_150_95-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150000_150_98-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_83-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_86-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_111-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_114-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_117-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_120-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_102-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_105-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_108-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_112-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_115-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_126-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_102-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_107-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_83-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_86-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_93-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_96-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_99-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_43-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_46-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_49-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_54-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_60-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_63-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_68-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_71-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_76-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_87-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_24-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_27-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_34-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_37-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_40-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_22-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_11-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_18-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_80-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_83-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_99-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_70-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_75-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_78-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_10-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_13-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_16-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_19-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_5-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>podman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>podman-cni-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-server1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprotobuf-lite20</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgio-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libglib-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmodule-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgobject-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstallocators-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstapp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstaudio-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstgl-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstpbutils-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstriff-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsttag-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstvideo-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libslirp0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtpms0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsqlite3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwayland-client0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwayland-cursor0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwayland-egl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwayland-server0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-data-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-small</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_129-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_134-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_90-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_93-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_98-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_21-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_28-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_33-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfmt8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librados2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librbd1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcolord2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-query-loaders</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdk_pixbuf-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GdkPixbuf-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtirpc-netconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtirpc3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-1_1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_1-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-1_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ignition</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ignition-dracut-grub2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-presets-common-SUSE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>conmon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldb2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ucode-intel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-salt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-minion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-transactional-update</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wpa_supplicant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>containerd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-certs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-certifi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyajl2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls30</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls30-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-arm64-efi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-i386-pc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-snapper-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-x86_64-efi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-x86_64-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_101-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreetype6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsync</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terminfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terminfo-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cifs-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgpg-error0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>permissions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvmtools0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libharfbuzz0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_108-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_111-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_133-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_136-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_123-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_126-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpg2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksba8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150000_150_101-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150000_150_104-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-xcb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_114-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_139-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_144-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_131-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_139-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libz1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsystemd0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudev1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-container</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-journal-remote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-sysvinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexpat1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-setuptools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-future</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kpartx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpath0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>multipath-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdbus-1-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_certmap0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_idmap0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_nss_idmap0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-krb5-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-py</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_15_5-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_38-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sudo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpixman-1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_142-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_145-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_106-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_109-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_112-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_115-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzstd1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zstd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcares2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_15_8-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_41-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_147-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_15_11-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_15_18-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_15_23-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_46-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_55-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_60-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_117-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_134-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_150-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_153-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_156-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_159-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_162-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_137-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_142-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_145-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_148-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_151-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_154-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_118-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_121-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_124-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_15_28-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_63-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_66-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_11-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_53-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_120-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xxd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_165-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_173-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_148-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_151-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_154-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_15_37-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_13_5-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-client3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-common3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-core7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_127-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_15_40-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_69-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_74-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_12-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_7-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>runc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmicrohttpd12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dnsmasq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>login_defs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shadow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dmidecode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_125-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_157-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_15_46-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_13_11-rt</name>
	</rpminfo_object>
</objects>
<states>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.38-44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.39-47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.43-52.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.44-52.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.44-52.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.48-52.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.49-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-14.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.51-52.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.51-52.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.51-52.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.51-60.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.51-60.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.53-60.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.57-60.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.59-60.41.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.59-60.45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.59-60.45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.32-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.32-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.36-38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.36-38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-7.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-10.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.39-47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.43-52.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-150300.10.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <signature_keyid operation="equals">b88b2fd43dbdc284</signature_keyid>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">5.2</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-5.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.49-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.44-52.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.51-60.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.51-60.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-8.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-11.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.53-60.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.21-69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.21-81.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.21-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.21-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.38-93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.38-93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.57-60.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.93.1.150300.18.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.106.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-150000.3.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-17.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.59-60.41.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-20.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.62-60.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-5.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.62-60.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-9.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.62-60.64.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.62-60.64.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-23.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.67-60.64.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.21-81.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.67-60.64.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.21-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.103-6.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.103-6.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.82-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.82-6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.82-6.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.92-6.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.92-6.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.92-6.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-18.10.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.49-92.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.49-92.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.59-92.17.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.59-92.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.59-92.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.74-92.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.74-92.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.74-92.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.74-92.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-18.13.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.82-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-21.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.59-92.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.90-92.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.90-92.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.92-6.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-120.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-21.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.59-92.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.82-6.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.114-94.11.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.114-94.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.21-69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.103-92.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.103-92.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.90-92.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.90-92.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-25.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-25.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-18.7.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.49-92.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.118.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.118.1.150300.18.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.124.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.67-60.64.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.69-60.64.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-11.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.26.1-150300.17.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.69-60.64.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.69-60.64.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.49-92.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.73-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-2.3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.73-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22-150300.7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.177-150300.11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.120-94.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.126-94.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-12.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-195.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-34.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.131-94.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.132-94.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-25.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-25.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-25.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.138-94.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.140-94.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.143-94.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-10.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.2-150200.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-25.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-25.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.155-94.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.156-94.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.156-94.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.156-94.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-13.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-25.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.140-94.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-28.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-7.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-94.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-2.25.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-2.5-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-2.5-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-25.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-25.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.162-94.69.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.162-94.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.162-94.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-2.7.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-22.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-25.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-25.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-16.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.83.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.83.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-2.5-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-2.5-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-2.5-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-2.5-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-2.5-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.132-94.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-19.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-15.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-120.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-2.5-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-2.13.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:202008-150300.10.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.175-94.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.176-94.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.178-94.91.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.178-94.91.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-2.16.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-10.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-195.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.180-94.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-7.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.7.0-150000.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:202008-150300.10.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-2.19.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-16.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-2.22.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-19.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-150300.10.37.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.109.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.109.1.150300.18.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.115.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.31-150000.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.30-150000.7.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-6.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-28.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.19.0-150100.3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-2.10.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.175-94.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-18.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.51.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.43.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009185004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:73.2-150000.1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009185005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:73.2-150000.1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-9.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-31.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009176137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.0-150300.121.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009176138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.0-150300.121.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009176140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-150300.121.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009176141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.0_0_g155821a-150300.121.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009176142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-150300.121.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009176139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.0-150300.121.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.98.1.150300.18.56.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:65.1-150200.4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:65.1-150200.4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.35.2-150000.3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-150000.3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.2-150200.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.49.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-57.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-57.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.76.1.150300.18.45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009176101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.7-150100.3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.23.2-150000.4.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.2-150000.32.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.66.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.66.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.53.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.89.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.67.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.99.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.99.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.103.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.106.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.110.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.113.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.116.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.121.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.124.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.127.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.130.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.91.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150000.150.89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150000.150.92.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150000.150.95.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150000.150.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.111.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.114.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.117.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.120.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.102.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.112.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.115.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.126.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.107.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.83.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.86.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.60.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.71.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.37.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150400.4.12.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.90.1.150300.18.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.75.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.53.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.1-150300.9.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.1-150300.9.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.14.3-150300.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.15.13+git.591.ab36624310c-150300.3.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.75.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.2-150200.4.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.89.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.87.1.150300.18.50.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.62.6-150200.3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.5_06-150300.3.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-150300.10.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.32-150000.3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150400.4.21.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.3-150200.4.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-150000.3.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.1-150300.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.2-150300.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.39.3-150000.3.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.0-150200.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:99~1.18.0-150200.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.0814-150000.5.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.0814-150000.5.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.129.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.134.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150200.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150400.4.3.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.33.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.33.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1-150300.7.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.2.9.536+g41a9f9a5573-150300.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150200.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.101.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.101.1.150300.18.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.109.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.91.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.86.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.4-150200.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40.0-150200.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.6-150300.3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40.0-150200.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13-150000.4.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150200.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-150000.45.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.2.11.58+g38d6afd3b78-150300.5.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150200.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150200.3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:19-150200.3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.7-150300.9.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.7-150300.9.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150200.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1d-150200.11.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.45-150000.20.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.15.8+git.527.8d0c05d313e-150300.3.40.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150400.4.15.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150400.4.9.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.14.0-150300.6.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15-150100.8.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.5-150300.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.0313-150000.5.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.0313-150000.5.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150000.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150000.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150000.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150000.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150000.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150300.3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150400.4.6.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.3-150300.3.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.15.12+git.535.7750e5c95ef-150300.3.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-150000.45.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1d-150200.11.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.5_04-150300.3.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20230214-150200.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20220809-150200.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3004-150300.53.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9-4.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009176347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.16-150000.82.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.79.3-150000.3.90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2018.1.18-150000.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.5_10-150300.3.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-150000.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.7-150200.14.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.04-150300.22.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.04-150300.22.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.101.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150400.4.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.106.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.106.1.150300.18.60.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.112.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.12-150000.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.4-150000.4.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.7-150300.4.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.3-150000.4.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1-150000.5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:19-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.9-150100.5.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.42-150300.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.130.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.120.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.126.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.118.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20181225-150200.23.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.1.0-150300.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.79-150000.3.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.34-150000.3.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.66.0-150200.4.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.66.0-150200.4.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.4-150300.3.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.15.13+git.636.53d93c5b9d6-150300.3.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.4-150200.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.5_08-150300.3.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.111.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.133.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.136.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.136.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.123.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.126.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.27-150300.3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.1040-150000.5.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.1040-150000.5.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.5-150000.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.66.0-150200.4.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.0-150300.118.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.0-150300.118.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-150300.118.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.0_0_g155821a-150300.118.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-150300.118.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.0-150300.118.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150000.150.101.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150000.150.104.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150400.4.24.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-150000.3.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-150000.3.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-150000.3.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-150000.3.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.114.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.139.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.144.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.144.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.131.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.139.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.107.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150400.7.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-150000.45.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-150000.45.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.112.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.112.1.150300.18.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009176369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.121.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009176040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.10.23_ce-150000.175.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009176261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.115.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009176262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.115.2.150300.18.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.11-150000.3.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.15.13+git.540.fab3b2a46c6-150300.3.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:246.16-150300.7.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150400.4.18.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.5-150000.3.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:40.5.0-150100.6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.18.2-150300.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.5+126+suse.8ce8da5-150300.2.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.2-150100.8.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.5_12-150300.3.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.1-150300.23.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.2-150300.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.0-150100.5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1d-150200.11.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.66.0-150200.4.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.5-150000.3.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals"></version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.5p2-150300.3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:246.16-150300.7.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.34.0-150000.7.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-150300.10.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.39.3-150000.3.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.142.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.145.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.145.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.106.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.109.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.112.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.115.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.5-150000.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-150000.45.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34-150000.3.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.4-150000.1.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.0-150000.3.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.1234-150000.5.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.1234-150000.5.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.147.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.147.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.139.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150400.10.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.7-150200.14.25.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150400.16.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.55.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1d-150200.11.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009176037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.1386-150000.5.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009176041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.1386-150000.5.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.117.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.134.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.134.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.142.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150400.13.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.31-150300.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.79.4-150000.3.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4-150300.9.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4-150300.9.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.2-150300.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.150.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.153.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.156.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.159.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.162.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.162.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.137.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.142.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.145.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.145.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.148.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.151.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.154.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.154.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.118.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.121.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.124.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150500.6.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.53.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.120.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.150.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.1443-150000.5.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.1443-150000.5.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.1443-150000.5.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.153.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.137.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.120.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.165.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.173.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.173.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.148.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009185167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.151.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.154.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.154.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.151.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150500.9.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.148.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7-150100.3.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.156.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.142.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.148.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150500.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.127.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.159.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.5p2-150300.3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.114.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.131.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.66.0-150200.4.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009176017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.2-150200.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009176692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-150300.10.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.62.6-150200.3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.19-150000.87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.4-150200.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.5-150000.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.57-150000.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.86-150100.7.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.5p2-150300.3.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.1-150300.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.1-150300.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2-150100.9.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.125.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.125.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.165.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009185168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.151.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.157.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.157.1</evr>
  </rpminfo_state>
</states>
</oval_definitions>
